<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Service provider trying to connect existing OIDC app to Duo in APIs</title>
    <link>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877319#M109</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;That was very helpful, thank you.  Will try the generic SAML application.&lt;/P&gt;
&lt;P&gt;Our web app started with SSO via OIDC and recently we added SAML 2.  Have been super spoiled by the simplicity of OAuth2/OIDC.&lt;/P&gt;
&lt;P&gt;Because our SAML 2 is so new I don’t immediately know if an error is an edge case failure in our implementation or if their side is misconfigured.&lt;/P&gt;
&lt;P&gt;If you ever implement a “generic OIDC application” then count me as a fan!  The Auth API does look pretty close.&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Sat, 06 Feb 2021 00:57:35 GMT</pubDate>
    <dc:creator>Sean.Carnes</dc:creator>
    <dc:date>2021-02-06T00:57:35Z</dc:date>
    <item>
      <title>Service provider trying to connect existing OIDC app to Duo</title>
      <link>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877317#M107</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;There is a Duo Access Gateway user who would like to enable SSO to my company’s web app.  Normally we would just do the OIDC details exchange and be done.  Sometimes (like now) I need to dig into the documentation because there is some kind of oddity.&lt;/P&gt;
&lt;P&gt;Created a free trial account to poke through the UI.  It looks like they can go to Applications-&amp;gt;Protect an application-&amp;gt;Search Auth API.  From there it looks like a standard OIDC flow.&lt;/P&gt;
&lt;P&gt;Reading through the Auth API documentation there seems to be some spec changes?  Is this a superset and standard OIDC will still work?&lt;/P&gt;
&lt;P&gt;Could someone check my understanding of the different terminology Duo uses compared to OIDC?  Integration Key = ClientID&lt;BR /&gt;
Secret Key = Client Secret&lt;BR /&gt;
API hostname = Authority&lt;BR /&gt;
??? = MetadataAddress&lt;/P&gt;
&lt;P&gt;What would the MetadataAddress be?  Guessing it is Authority plus something standardized?&lt;/P&gt;
&lt;P&gt;Also, I did note that the Auth API documentation said to make sure “response_type” is set to “code”.&lt;/P&gt;
&lt;P&gt;Thank you for any help you can provide!&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 05 Feb 2021 22:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877317#M107</guid>
      <dc:creator>Sean.Carnes</dc:creator>
      <dc:date>2021-02-05T22:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Service provider trying to connect existing OIDC app to Duo</title>
      <link>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877318#M108</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;If I understand your question, you have a user of your web application that also has Duo Access Gateway installed, and they want to federate Duo Access Gateway with your application for SSO. Your web application already supports SSO.&lt;/P&gt;
&lt;P&gt;First, don’t use the Auth API for this! This is not the correct integration for Duo SSO.&lt;/P&gt;
&lt;P&gt;If your web application supports SAML 2.0, the Duo Access Gateway customer would create a &lt;A href="https://duo.com/docs/dag-generic"&gt;generic SAML application&lt;/A&gt; where they could specify the SSO information you provide for your application: Entity ID, ACS, etc.&lt;/P&gt;
&lt;P&gt;If your web application does not support SAML 2.0 (like if it is only OIDC), well, Duo Access Gateway ONLY supports SAML 2.0 service providers.&lt;/P&gt;
&lt;P&gt;The &lt;A href="https://duo.com/docs/oauthapi"&gt;OIDC Auth API&lt;/A&gt; is not a full OIDC implementation. It’s derived from OIDC standards and only delivers authorization, not authentication. It is used for integrating Duo 2FA directly into an application. The application continues to handle primary authentication.&lt;/P&gt;
&lt;P&gt;ETA: Our &lt;A href="https://duo.com/docs/duoweb"&gt;Web SDK&lt;/A&gt; is built on the OIDC-derived API, if you want to see how it’s implemented.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 05 Feb 2021 22:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877318#M108</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2021-02-05T22:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: Service provider trying to connect existing OIDC app to Duo</title>
      <link>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877319#M109</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;That was very helpful, thank you.  Will try the generic SAML application.&lt;/P&gt;
&lt;P&gt;Our web app started with SSO via OIDC and recently we added SAML 2.  Have been super spoiled by the simplicity of OAuth2/OIDC.&lt;/P&gt;
&lt;P&gt;Because our SAML 2 is so new I don’t immediately know if an error is an edge case failure in our implementation or if their side is misconfigured.&lt;/P&gt;
&lt;P&gt;If you ever implement a “generic OIDC application” then count me as a fan!  The Auth API does look pretty close.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 06 Feb 2021 00:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/service-provider-trying-to-connect-existing-oidc-app-to-duo/m-p/4877319#M109</guid>
      <dc:creator>Sean.Carnes</dc:creator>
      <dc:date>2021-02-06T00:57:35Z</dc:date>
    </item>
  </channel>
</rss>

