09-23-2025 10:35 PM
Hi all,
As per the DUO AUTH API documentation,
Lastly, compute the HMAC-SHA1 of this canonical representation, using your Duo application's secret key as the HMAC key. Send this signature as hexadecimal ASCII (i.e. not raw binary data). Use HTTP Basic authentication for the request, using your integration key as the username and the HMAC-SHA1 signature as the password.
Does this mean any caller is bound by these algorithms? Can I use a stronger algorithm say HMAC-SHA256 or 512?
Solved! Go to Solution.
09-25-2025 09:22 AM
Hey, we have a newer signing method using SHA-512 that is not in that document, but is supported by all our API clients on GitHub. You can see those signing details here: https://github.com/duosecurity/duo_hmac_python/blob/main/duo_hmac/duo_hmac.py.
09-25-2025 09:22 AM
Hey, we have a newer signing method using SHA-512 that is not in that document, but is supported by all our API clients on GitHub. You can see those signing details here: https://github.com/duosecurity/duo_hmac_python/blob/main/duo_hmac/duo_hmac.py.
09-26-2025 05:45 AM
Thanks for the information.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide