Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Duo Security connector uses SAML 2.0 federation. Duo combines identity verification with multi-factor authentication in a single sign-on flow — making it well-suited for environments where strong authentication is required at every login.Use Cases
- MFA-integrated SSO — Leverage Duo’s built-in multi-factor authentication alongside SAML-based single sign-on, adding strong authentication to applications managed by the Orchestrator
- Unify SSO with Duo MFA for legacy apps — Extend Duo’s MFA capabilities to legacy and on-prem applications that lack native Duo support, delivering consistent strong authentication across your hybrid environment
- Strengthen resilience with MFA failover — Pair Duo with a secondary IdP through the Continuity connector so authentication continues even if one provider is unavailable, with MFA enforced throughout
- Consolidate MFA under Duo — Route authentication from multiple IdPs through Duo to standardize multi-factor policies, reducing the cost and complexity of managing MFA across separate platforms
Configuration
- Console UI
- Configuration
To create a Duo (SAML) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Duo (SAML).
- Enter a Name — the friendly name for your Duo provider.
- Enter the Metadata URL — the URL of Duo’s SAML metadata document, typically
https://{api-host}/saml2/idp/metadata. - Enter the Consumer Service (ACS) URL — the Assertion Consumer Service URL where Duo sends SAML responses.
- Enter the Entity ID — the unique identifier for the Orchestrator as the SAML Service Provider.
- Optionally enter a Logout Callback URL for Single Logout (SLO) callback.
- Optionally enter the SP Certificate Path and SP Private Key Path for signing SAML requests.
- Optionally enable IdP Initiated Login to allow authentication flows started by Duo.
- Click Save.
Troubleshooting
- Verify the SAML metadata URL is accessible from the Orchestrator host — ensure the Duo API hostname is correct
- Ensure the Entity ID matches the Duo configuration — the
samlEntityIDmust match what is configured as the trusted Service Provider in the Duo Admin Panel - Check the ACS URL — the
samlConsumerServiceURLmust match the Orchestrator’s callback endpoint. If behind a load balancer, use the external-facing URL. - Confirm Duo SAML application is active — disabled or draft applications in Duo will not respond to authentication requests