Skip to main content

SSO with Duo Security

Steps to take to enable SAML SSO connection with Tulip SP using Duo as MFA/IdP Proxy

Support avatar
Written by Support
Updated over 4 months ago

Could not display content

Cisco Duo Security is a Multi-factor Authentication service.

In order to establish a SAML-based SSO to Tulip using Cisco Duo Security as the Identity Provider (or authentication proxy), you need to follow these steps in your Duo Security management:

  1. Obtain a unique Connection Name from Tulip (via Support or your Customer Success rep), that will be used to identify your connections (usually hyphenated domain name, e.g. my.domain.com β†’ my-domain-com).

  2. Go to Applications β†’ Protect an Application β†’ Generic SAML Service Provider

    1. Enter a name (e.g. "Tulip SSO")

  3. Continue to Configure β†’ Manually Enter

    • ACS URL: https://auth.salto.io/login/callback?connection=REPLACE_ME

    • Entity ID: urn:auth0:tulip:REPLACE_ME

    • The REPLACE_ME should be replaced with the unique Connection Name from the first step

  4. Save the application

  5. Download XML and send to Tulip

Let us know also the full list of domains where your users will be logging in from (e.g. myorg.com, myorg.co.uk, etc.)

Did this answer your question?