Lab – Set up DUO as Second Auth Factor

This lab will teach you how to configure DUO as Second Auth Factor. Estimated completion time: 30 minutes

Task - Get the values from DUO Admin Panel

1. Log in to the Duo Admin Panel and navigate to Applications. Then click on F5 BIG-IP APM. image136
  1. Copy the values for:

    Integration key

    Secret key

    API hostname

image137

Task - Configure the Proxy for APM

1. In the Win 7 External open (as administrator) the file C:Program FilesDuo Security Authentication Proxyconfauthproxy.cfg image138

1. Search the section [radius_server_iframe] and modify the following values according to your DUO account

  • ikey
  • skey
  • api
image139

Task - Modify the Access Policy to include DUO

1. Go to Access -> Authentication -> RADIUS -> Create. image140

2. Create a new record, using the following info and then Finished.

Name: DUO_RADIUS

Mode: Authentication

Server Connection: Direct

Server Address: 10.1.10.199

Authentication Service Port: 1812

Secret: password

Confirm Secret: password

Timeout: 60

image141
3. Go to Access -> Profile / Policies -> Access Profile then locate the webtop_demo profile and click Edit. image142
  1. Click on Add New Macro
image143
  1. Name it DUO and Save
image144
  1. Click on the + between In and Out
image145
7. Under the Authentication tab, search for RADIUS Auth and click Add Item

image146

image147

8. Create a new record, using the following info (leave the defaults) and then Save.

Name: DUO AUTH

AAA Server: /Common/DUO_RADIUS

image148
9. Go to the Macro DUO and click on Edit Terminals. Then Add Terminal and Rename the terminals according to the image. Also change the order.

image149

image150

10. Click on the + between AD Auth and Get Ga Code image151
11. Under the General Purpose tab, choose Decision Box and then Add Item image152

12. Create a new record, using the following info (leave the defaults).

Name: MFA DECISION

Message: Choose one of the following two factor ...

Option 1: GOOGLE

Option 2: DUO

image153
13. Under the Branch Rules tab change the name to GOOGLE and then Save. image154
14. Click on the + in front of the MFA DECISION fallback branch. image155
  1. Choose DUO under the Macros tab, then Add Item.
image156
16. Click on the + in front of the DUO Successful branch. image157
17. Under the Authentication tab, choose AD Query and then Add Item image158

18. Create a new record, using the following info (leave the defaults).

Name: AD Query DUO

Server: /Common/webtop_demo_aaa_srvr

image159
19. Under the Branch Rules tab, click on change Expression. image160
  1. Delete the expression by click on the X symbol.
image161

21. Create a new expression, using the following info (leave the defaults), then click Add Expression and Save

Agent Sel: AD Auth

Condition: AD Auth Passed

Active Directory Auth has: Passed

image162
22. Click on the AD Query DUO box, then go to Branch Rules tab and modify the name to Passed Query and Save

image163

image164

23. Click on the + in front of the AD QUERY DUO Passed Query branch. image165
24. Under the Assignment tab choose Advanced Resource Assign, then Add Item image166
  1. Click on Add new entry
image167
  1. Click on Add/Delete
image168
  1. Add the following resources and then Save

    Portal Access: portal_intranet

    SAML: AWS_SAML_DEMO, SALESFORCE_SAML_DEMO

    Webtop: webtop_demo_webtop

image169
28. Change the ending to Allow and click on Apply Access Policy. image170

Task - Configure the APM to use the DUO Service

1. Go to Access -> Profiles / Policies -> Customization -> Advanced image171

2. Navigate to Access Profiles -> /Common/webtop_demo -> Common -> header.inc and insert the line <script src="https://api-XXXXXXXX.duosecurity.com/frame/hosted/Duo-F5-BIG-IP-v2.js"></script> at the end of file and then Save.

NOTE: Use the api URL from your DUO account.

image172
  1. Click on Apply Access Policy
image173
  1. Restart the Proxy DUO Service. Go to Start -> Services and then click Restart
image174

5. Go to https://webtop.vlab.f5demo.com. You should see the Google Authenticator and DUO options to use as Second Factor. Try to log in with any user:

  • sales_manager
  • sales_user
  • partner_user
image175