This documentation describes the SAML Single Sign-on feature guide for the account/user. The document includes detailed steps for activating the SAML SSO feature and configuration steps for Duo Security.
To get access to the SAML Single Sign-on for the account/user, the following steps should be completed:
The subscription plan should support SAML Single Sign-on
The account should be active
The super admin of the account and users should be active
SSO SAML Configuration Steps for DUO Security
Login to the main user’s account
Go to the settings and click the SAML Single Sign-on
Click the Connect Identity Provider button
On the opened page type a connection name
Copy the Entity ID and Assertion Consumer Service URL and add to the Duo Security (Note: Make sure your users are assigned to your application.)
On Duo Security, you will need to create a new application to create the SAML SSO connection between PowerDMARC and Duo.
Navigate to Application > Create New Application
Search for SAML Service Provider
- On this page, give your connection a name and add in the Entity ID and ACS ID you have generated in your PowerDMARC Account.
- It is advisable to to set the Signature Algorithm to SHA-256
- Download the Metadata information, you will need to upload this on the PowerDMARC portal.
- Once done creating your new SAML SSO application, head back over to your PowerDMARC account.
- Upload the downloaded metadata to the platform to complete the configuration process
- Enable or Disable the “Force IdP Re-authentication” option
- Enable or Disable the “Prepopulate the User Email Address” option
- Click the Create Connection button
- Your connection is created!
Information about the SAML Single Sign-on Login Session
Duo Security IdP always requires a username and password.
Contact us for further information, or read our SSO SAML user guide to configure SSO setups for other identity providers.