Enable SAML SSO for Management Center Using Duo

Is this Guide for You?

This guide helps network administrators configure Security Assertion Markup Language (SAML) Single Sign-On (SSO) in Firewall Management Center with Duo as the Identity Provider (IdP).

Overview of SAML SSO in Firewall Management Center

When you enable SSO in Firewall Management Center, the login page displays an SSO link. Users with SSO access can click this link to sign in through their IdP, in this case, Duo, instead of entering a username and password in the Firewall Management Center login page. After Duo authenticates the user, they are redirected back to the Firewall Management Center web interface and are automatically logged in. Firewall Management Center does not require a direct network connection to Duo because all communication between Firewall Management Center and Duo occurs through the user’s browser.

In a multitenant Firewall Management Center, you can configure SSO to assign SAML users to specific subdomains. This configuration must be done at the global domain level. If there is a mismatch between the roles in Duo and Firewall Management Center, the default role, which is that of a security analyst, is assigned to the user. With this default role, a user has access to all domains.​

System Requirements

Table 1 lists the platforms and versions for this feature and the example provided in this document.

Product

Version

Version used in this guide

Cisco Secure Firewall Management Center

6.7 or later

10.0

Cisco Secure Firewall Threat Defense

6.7 or later

10.0

Duo Admin Panel

Duo 75

Prerequisites for Configuring Duo for SSO in Firewall Management Center

  • Ensure that you have a Duo administrator account.

  • Log in to Duo Admin Panel at https://admin.duosecurity.com/login using your Duo administrator account credentials.

  • Complete two-factor authentication.

  • Download Duo Mobile on user's device for two-factor authentication.

  • Ensure that Firewall Management Center can reach the Duo IdP.

Guidelines for Using Duo to Enable SAML SSO in Firewall Management Center

Guidelines

  • Only users with the administrator role authenticated internally or by LDAP or RADIUS can configure SSO.

  • In Firewall Management Center high-availability configurations, ensure that you follow these guidelines:

    • Since SSO configuration is not synchronized between the members of the high availability pair, you must configure SSO separately on each member of the pair.

    • Both Firewall Management Centers in a high-availability pair must use the same IdP for SSO. You must configure a service provider application in Duo for each Firewall Management Center configured for SSO.

    • Before a user can use SSO to access the secondary Firewall Management Center for the first time, that user must first use SSO to log into the primary Firewall Management Center at least once.

  • Do not configure SSO in deployments using CC mode.

Limitations

  • Firewall Management Center can support SSO with only one SSO provider at a time—you cannot configure the Firewall Management Center to use, for instance, both Duo and Okta for SSO.

  • Firewall Management Center does not support SSO initiated from Duo.

  • Firewall Management Center does not support logging in with CAC credentials for SSO accounts.

Workflow for Enabling SAML SSO in Firewall Management Center Using Duo

Workflow for enabling SAML SSO on Management Center using Duo

Step

Task

More Information

1

Log in to Duo Admin panel.

2

Create users in Duo.

Create a User in Duo

3

Create groups in Duo.

Create a Group in Duo

4

Create policies in Duo.

Create a Policy

5

Configure a Firewall Management Center application in Duo.

Create a Firewall Management Center Application in Duo

6

Enable SSO and configure Firewall Management Center for SSO.

Configure Firewall Management Center for Duo SSO

7

Test SSO configuration in Firewall Management Center.

8

Configure user role mapping in Firewall Management Center.

Configure Firewall Management Center for Duo SSO

Create a User in Duo

You must create Duo user accounts from the Duo Admin panel. These user accounts allow your end-users to log in to Duo-protected services and applications with two-factor authentication.

Procedure


Step 1

From the Duo Admin panel, choose Users > Users.

Step 2

Click Add user.

Add user in Duo Admin Panel

Step 3

In the Username field, enter the username.

Step 4

In the Display Name field, enter the user's display name.

Step 5

In the Email Address field, enter the user's email address.

Step 6

Click Add User

The user is created and you enter the edit mode for the user.

Step 7

In Device enrollment, click Send email.

This email contains a link that lets the user enroll in Duo.

Device enrollment for a user in Duo Admin Panel

Step 8

In Status, click the Active radio button to require multi-factor authentication (MFA) for the user.

Step 9

Click Save Changes.

The user gets an email from Duo Security to set up a user account for Duo. The user must click the link in the email to create an account.


Create a Group in Duo

You can use groups to organize and manage users in Duo.

In this example, we create a group, and associate it with the Firewall Management Center application, and configure it such that only users who are members of the group can get authenticated in Firewall Management Center.

Procedure


Step 1

From the Duo Admin panel, choose Users > Groups.

Step 2

Click +Add group.

Add a group in Duo Admin Panel

Step 3

In the Group name field, enter the group name.

Step 4

Click Add Group.

The group gets created and you enter the edit mode for the group.

Configure a group in Duo Admin Panel

Step 5

In Status, click Active to require two-factor authentication for all users in the group.

Step 6

Click +Add users to group.

Step 7

In the Add Users To Group dialog box, choose one or more users from the drop-down list.

Add users to group

Step 8

Click Add User To Group.

The groups are listed in the Groups page. In our example, the groups are:

  • FMCadmin

  • FMCmaintenance

  • FMCreadonly


Create a Policy

You can create policies and assign them to groups to control how your users get authenticated.

Procedure


Step 1

From the Duo Admin panel, choose Policies > Policies.

Step 2

Click +Add Policy.

The Create a new policy dialog box is displayed with rules in the left pane.

Create a new policy in Duo

Step 3

Choose the required rules from the left pane. The parameters corresponding to these rules are displayed on the right pane.

Step 4

Configure rules to enable your company's user authentication requirements.

By selecting Enforce MFA, the Authentication policy in this example requires all users to use MFA.

Authentication policy in Duo

Step 5

Click Save.


Create a Firewall Management Center Application in Duo

To enable SAML SSO for Firewall Management Center with Duo, create a Firewall Management Center application in Duo.

Procedure


Step 1

From the Duo Admin panel, choose Applications > Applications.

Step 2

Click + Add application.

Step 3

Search for Generic SAML Service Provider in the Application Catalog in the search bar.

Step 4

Click + Add.

Step 5

Click the Single Sign-On tab.

Step 6

In the Application name field, enter a name of the application.

Step 7

In User access, click the Enable for all users or the Enable only for permitted groups radio button.

Note

 

By default, all users are disabled. Ensure that you enable permitted groups or all users.

Step 8

In Metadata, the Entity ID, Single-Sign-On URL, and Metadata URL fields are auto-populated.

Step 9

Click Download XML to download this metadata information.

You need to upload this XML to configure Duo metadata in Step 5 in Configure Firewall Management Center for Duo SSO.

Step 10

In the Entity ID field, enter the FQDN or IP address of the Firewall Management Center and append the /saml/metadata string, for example, https://xxxxxxxxx-xxxxxxx.xxxxx.com/saml/metadata.

Step 11

In the Assertion Consumer Service (ACS) URL field, enter the FQDN or IP address of the Firewall Management Center and append the /saml/acs string, for example, https://xxxxxxxxx-xxxxxxx.xxxxx.com/saml/acs.

Step 12

Configure Role attributes.

  1. In the Attribute name field, enter an attribute name.

    In this example, the Attribute name is FMCgroup. In Firewall Management Center, you must use this value as the Group Member Attribute value (Step 10 in Configure Firewall Management Center for Duo SSO).

  2. In the Service Provider's Role field, enter the Firewall Management Center role.

    In this example, the configured roles are FMCadmin, FMCmaintenance, and FMCreadonly.

  3. From the Duo groups drop-down list, choose the Duo group corresponding to the Firewall Management Center role.

Step 13

In Policy, click Apply a policy to group of users.

Step 14

Click Save.


Configure Firewall Management Center for Duo SSO

Enable SSO on Firewall Management Center and configure the SSO parameters and user role mapping.

Before you begin

Create a Firewall Management Center service provider application in the Duo Admin panel. For more information, see Create a Firewall Management Center Application in Duo.

Procedure


Step 1

From Firewall Management Center, choose Administration > Users > Single Sign-On.

Step 2

Click the Single Sign-On (SSO) Configuration toggle button to enable SSO.

Step 3

Click Configure SSO.

Step 4

In the Select Firewall Management Center SAML Provider dialog box, click the Duo radio button and click Next.

Select Duo as the Management Center SAML Provider

Step 5

In the Configure Duo Metadata dialog box, click the Upload XML File radio button to upload the metadata file for Duo.

This XML file is the metadata XML file that you downloaded from Duo in Step 9 in Create a Firewall Management Center Application in Duo. After you upload the XML file, the metadata gets auto-populated in the Configure Duo Metadata dialog box.

Duo Metadata in Management Center

Step 6

Click Next.

Step 7

Verify the Duo metadata and click Save.

Step 8

Expand Advanced Configuration.

Step 9

From the Default User Role drop-down list, choose a default Firewall Management Center user role to be assigned if there are no other roles configured.

Step 10

In the Group Member Attribute field, enter the Attribute name configured in Duo for Firewall Management Center role mapping of users or groups (Step 12a in Create a Firewall Management Center Application in Duo).

In this example, the group member attribute is FMCgroup.

Step 11

Configure one or more user role mappings and associate them to one or more domains:

  1. For Group Member Attribute Value, click the edit icon and enter the attribute value as a string or a regular expression that matches the attribute value defined in Duo.

  2. Click + Add user role mapping to create a new group.

    In this example, the group member attribute values are FMCadmin, FMCmaintenance, and FMCreadonly.

  3. From the Domains drop-down list, choose one or more domains.

    In this example, the domain for all the group member attribute values is Global.

  4. From the Roles drop-down list, choose one or more user roles.

    The Firewall Management Center compares the attribute value against the user role mapping attribute value that Duo sends to the Firewall Management Center with SSO user information. When a match is found, the Firewall Management Center grants the corresponding role to the user along with access to the configured domains.

    In this example, the assigned roles for FMCadmin, FMCmaintenance, and FMCreadonly group member attribute values are Administrator, Maintenance User, and Security Analyst respectively.

  5. (Optional) Click Add user role mapping to add more user role mappings.

  6. Click Test Configuration.

    Note

     

    If the system displays an error message, review the SSO configuration for the Firewall Management Center as well as the Duo application configuration. Correct any errors, and try again. If errors persist, contact Cisco Technical Assistance Center.

  7. When the system reports a successful configuration test, click Apply.


Validate SAML SSO in Firewall Management Center Using Duo

Log in to Firewall Management Center using SSO

  1. Click the Single Sign-On (SSO) link in the login page of the Firewall Management Center web interface.

  2. Enter your email address in Duo Security for two-factor authentication.

  3. Click Next to get the push notification on your Duo mobile application in your mobile device.

  4. Log in to the Firewall Management Center web interface after the two-factor authentication.

Your Firewall Management Center role and domain depends on the user role mapping in Duo. Each Firewall Management Center role is mapped to a group in Duo.

View users in Firewall Management Center

As an administrator, you can verify the users who have logged in to Firewall Management Center using SSO.

  1. Log in to the Firewall Management Center with your admin credentials.

  2. Choose Administration > Users > User Accounts.

View audit logs in Firewall Management Center to monitor user activity

Firewall Management Center logs audit information about user activity as audit logs. To view these logs, choose Events & Logs > Analysis > Audit Logs.

Troubleshoot SAML SSO in Firewall Management Center

  • Symptom: User is unable to log in to Firewall Management Center.

    Resolution: Verify the connectivity between Firewall Management Center and Duo.

  • Symptom: User is unable to log in to the correct domain in Firewall Management Center.

    Resolution: Verify the user role mapping in Firewall Management Center and Duo.

  • Symptom: Server Error message is displayed in the Firewall Management Center Single Sign-On (SSO) page.

    Resolution: Verify the connectivity between Firewall Management Center and Duo. If problem persists, contact Cisco TAC.