# DUO SSO

{% hint style="success" %}
Please complete the steps in the [Admin Console Configuration](https://docs.keeper.io/en/sso-connect-cloud/admin-console-configuration) section first.
{% endhint %}

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FLkeweW4r5J3k67vI5aqJ%2FDUO%20SSO.jpg?alt=media&#x26;token=1bb0112a-e91b-41c6-b9ff-bfadb8402945" alt=""><figcaption></figcaption></figure>

### Duo Setup

These instructions assume Duo has already been successfully enabled and configured with an authentication source (Active Directory or IdP). To activate Duo SSO, visit your Duo Admin Panel and visit the "Single Sign-On" section.

### Step 1: DUO SSO Configuration

Log in to the Duo Admin Panel and click **Protect an Application**. Search for Keeper and choose Keeper Security with type "2FA with SSO hosted by Duo (Single Sign-On)" in the applications list then click "Protect" (shown below as Configure).

![Protect Keeper Security SSO Type](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FT8FHi2ToVvWuD7SE0bal%2Fslack_KXcXPsH0TW.png?alt=media\&token=b4843492-8ca2-494d-8e6d-b70d118cfde5)

### Step 2: Metadata

The **Download** section is where you can download the SAML metadata file to upload into your SSO provisioning method.

![Download DUO Metadata file](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FnP5iZW2Wa5Y74Ffcb9Ot%2Fslack_ltejOPeni9.png?alt=media\&token=ba7dc140-93d1-4715-950b-393beca58c53)

Back on the Keeper Admin console, locate your DUO SSO Connect Cloud Provisioning method and select **Edit**.

![Edit DUO SSO Provisioning Method](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MGAp7etKFGrXmbB5zBP%2F-MGAv2zKx89VS_t-6ep9%2Fedit-gsso.png?alt=media\&token=2c3b53a5-d096-4ad2-8bd5-d34055e0719d)

Scroll down to the **Identity Provider** section, set IDP Type to **DUO SSO**, select **Browse Files** and select the DUO Metadata file previously downloaded.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FOLaTkkcCPAyzUdIYy7uB%2Fchrome_DF3z32h1ua.png?alt=media\&token=c5a0f644-9f74-40d3-868a-52d7bc5c568b)

Still within the Keeper Admin Console, exit **Edit View** and select **View** on your DUO SSO Connect Cloud Provisioning method. Within the **Service Provider** section you will find the metadata values for the **Entity ID, IDP Initiated Login Endpoint** and **Assertion Consumer Service (ACS) Endpoint**.

{% hint style="info" %}
**Single Logout Service (SLO) Endpoint** is optional.
{% endhint %}

![View DUO SSO Provisioning Method](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MOcCJCmHyWFpab7womz%2F-MOcD5pB_hwDW86t38Lv%2FDuoSSOview.PNG?alt=media\&token=1ed59884-7e1e-4f08-9d41-283d3032d5f2)

Return to the application page in your Duo Admin Panel, copy and Paste the **Entity ID, Login Endpoint** and **ACS Endpoint** into the **Service Provider** section.

![Keeper Metadata Info](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MOcEBElzhp2HGNAoe1L%2F-MOcFFMQdhEa7sY9ituE%2FDuoSpMetadata.PNG?alt=media\&token=0f937752-f799-4496-be22-1bdd0cb076eb)

### Step 3: Map User Attributes

Within the **SAML Response** section, scroll down to **Map attributes** and map the following attributes.

{% hint style="info" %}
**Ensure that 3 attributes ("First", "Last" and "Email") are configured with the exact spelling as seen below**.
{% endhint %}

![User Attributes](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MOcFc6ZDLXAhJ4r-Oc5%2F-MOcI0InG4PnTSTDCk7E%2FDuoAttribMap.PNG?alt=media\&token=221fdb5a-18f0-40ac-8881-56f478fffa1d)

### Step 4: Policy (optional)

Within the **Policy** section, defines when and how users will authenticate when accessing this application. Your global policy always applies, but you can override its rules with custom policies.

![User or Group Policy](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MOcXSFW9_3EyGnNJGeX%2F-MOcY-ycrUAu7-lQCFEt%2FDuoPolicyh.PNG?alt=media\&token=cbcc7510-8d74-4f0c-8097-7187f2dd7274)

### Step 5: Global Policy

Within the **Global Policy** section, Review / Edit / Verify any **Global Policy** as seen by your DUO and or Keeper administrator.

{% hint style="success" %}
Success! Your **Keeper Security EPM - Single Sign-On** setup is now complete!
{% endhint %}

### Troubleshooting

If you need assistance implementing the **Keeper Security EPM - Single Sign-On** application within your DUO environment, please contact the Keeper support team.

### Moving Existing Users to Duo SSO

Users created in the root node (top level) in the Keeper Admin Console will need to be moved to the SSO node if you want the users to login with Duo. An admin cannot move themselves to the SSO enabled node, another admin must perform this action.

After the user is moved to the SSO enabled node, they can login to the Keeper vault by simply typing their email address and clicking "Next". If this does not work, please ensure that your email domain (e.g. company.com) has been [reserved to your enterprise](https://docs.keeper.io/enterprise-guide/domain-reservation) and ensure that Just-In-Time provisioning is enabled.

To onboard with the Enterprise Domain, the user can select the "Enterprise SSO" pull down and type in the Enterprise Domain configured in the Keeper Admin Console.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FfFPNzWDvSwH48ebLJOeY%2FSSO_Login.png?alt=media&#x26;token=f7bc0249-986d-427d-9746-0e7873ff7840" alt=""><figcaption><p>Initially select 'Enterprise SSO Login'</p></figcaption></figure>

Once the user has authenticated with SSO for the first time, they only need to use their email address next time to initiate SSO authentication.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FDrVwIHQiMQDtlxeJey0G%2Fvault_Login.PNG?alt=media&#x26;token=2e435451-c23e-41bd-91e2-8ec49a216c16" alt=""><figcaption></figcaption></figure>

If typing in the email address and clicking Next does not route the user to the desired SSO, ensure that just-in-time provisioning is enabled in the Keeper SSO configuration and ensure that your email domain is reserved by Keeper. More information regarding routing and domain reservation [can be found here](https://docs.keeper.io/enterprise-guide/domain-reservation).
