Duo Integration for Active Directory
Table of Contents
- 1 Service Name
- 2 Service Overview
- 2.1 Description
- 2.2 Benefits
- 2.3 ITS Responsibilities
- 2.3.1 Initial
- 2.3.2 Ongoing
- 2.3.3 End-of-Life
- 2.4 Service Consumer Responsibilities
- 2.4.1 Preparation
- 2.4.2 Administrative
- 2.4.3 Data Protection
- 2.4.4 Security
- 3 Availability & Response Times
- 3.1 Support Requests
- 4 Service Owner
- 5 Service Representative
Service Name
Duo Integration for Active Directory
Access to this service is controlled by InfoSec using a grouping.
Service Overview
Description
This service allows for IT staff managing Active Directory (AD) infrastructure across the UH System to integrate their AD-related servers (domain controllers, DNS servers, file shares, etc.) with Duo in order to force MFA when administrators log in to the servers. Requests for this service must be submitted by authorized IT staff and must include requisite information about the AD-related instances and administrator user accounts.
For an Active Directory-related instance, ITS will:
set up a new Duo application
set up Duo aliases to be used with the various privilege levels of AD user accounts provided by the requester
provide the applicationโs integration key, secret, and api hostname (and link requestor to Duo documentation - https://duo.com/docs/rdp )
The following AD account naming conventions are required to prevent conflicts in the UH Duo domain:
The base AD account name must match UH Username for chain-of-responsibility and lifecycle management purposes.
Privileged accounts are requested numerically. Example, requesting 3 privileged accounts results in the following aliases:
uhusername-ad0, uhusername-ad1, uhusername-ad2, where the privilege level strictly communicates the actual privilege level.
Special account naming is supported by designating an account name suffix. Example backup account:
uhusername-ad0-bup
Benefits
Support security best practices for establishing account privilege levels and protecting each with Duo MFA.
Establish a standard convention based on the UH Username for naming AD accounts across multiple privilege levels.
ITS Responsibilities
Initial
InfoSec: Generate the Duo integration information and securely transmit it to the requester.
CSOC: Generate the Duo aliases
Ongoing
Lifecycle administration
End-of-Life
Ensure access to role transitions as needed for AD access lifecycle administration.
Service Consumer Responsibilities
Preparation
Consumer is responsible for configuring the administrator usernames to match the DUO alias format
For departments interested in setting up DUO for VDI additional requirements are needed
Protecting servers with DUO will require 443 outbound to the DUO api instance, if you restrict your tier0 from accessing the internet directly you will need to either allow outbound to the DUO host, setup a proxy, or setup offline mode
Duo Authentication for Windows Logon - Guide to Two-Factor Authentication ยท Duo Security
https://help.duo.com/s/article/1337?language=en_US&elqTrackId=c698be99e5c84430be52a4ff23e04018&elq=6debbbe43bb64f49a055014fb768bcba&elqaid=9743&elqat=1&elqCampaignId=9013 (University of Hawaii is deployed on DUO9)
Administrative
Installing the duo application
Data Protection
The API information is โsensitiveโ data and must be stored securely.
Security
Ensure timely deprovisioning of access to AD resources and/or privileged accounts.
Availability & Response Times
Support Requests
Requests are usually processed during normal business hours.
Requests should receive a reply within 2 business days.
Service Owner
ITS InfoSec
Service Representative
Jason Young
Contact information: <infosec@hawaii.edu>
ย