

From the Authentication Servers list, select RADIUS.You must configure RADIUS authentication settings and enable Mobile VPN with SSL on your Firebox. In our configuration, the Duo Security Authentication Proxy and Active Directory are on the same subnet. Active Directory is used for primary user authentication. It communicates with Active Directory, Duo Security service in the cloud, the WatchGuard Firebox, and the Duo mobile app. The Duo Security Authentication Proxy acts as a bridge. Use the Duo account to log in to the Duo Service to manage applications, enroll users, and get integration keys. To complete this integration, you must have: Duo Mobile Application 4.15.0.43.1 on iOS.Windows Server 2016 with Active Directory Domain Services.Duo Security Authentication Proxy 5.6.1 on Windows.The hardware and software used in this guide include: This diagram shows the test topology for this integration. This Duo Proxy receives incoming RADIUS requests from your Firebox, contacts your existing local LDAP/AD to perform primary authentication, and contacts the Duo cloud service for secondary authentication. You must install a local Duo Proxy service on a device within your network.

#Download duo authentication proxy software download#
This document describes the steps to integrate WatchGuard Mobile VPN with SSL client software download access and Mobile VPN with SSL client authentication with the Duo Security® two-factor authentication solution. Duo Security RADIUS Authentication Integration Guide Duo Security Integration Overview
