cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
199
Views
0
Helpful
1
Replies

Duo Web SDK v4 beyond login - Administrative actions

wender
Level 1
Level 1

I am starting an integration using the Web SDK for a web application. The login flow fits perfectly well with the example provided in the Duo Web SDK documentation, and we plan to implement it as described.

However, our application includes a feature we call "administrative actions." These are sensitive operations (e.g., modifying user permissions..) that occur post-login and require two-factor authentication (2FA) verification before execution.

  1. Is the Web SDK the appropriate solution to handle these "administrative actions" flows, or would you recommend using a different approach? (How do you recommend implementing this flow while keeping the user on the page where the "administrative action" is performed?)
  2. Does the Web SDK have any limitations or constraints for handling multiple 2FA requests?
  3. Would implementing post-login 2FA for these flows with the Web SDK require any specific configuration changes or additional considerations beyond the default setup?
  4. If we decide to add mobile support for login, can the Web SDK be used as well? What about administrative actions?
1 Reply 1

DuoKristina
Cisco Employee
Cisco Employee

>(How do you recommend implementing this flow while keeping the user on the page where the "administrative action" is performed?)

In WebSDK implementations a redirect to Duo for MFA is required. Maybe pop up a separate window for the elevation MFA and store the result in your application such that the elevated action knows that it was authenticated?

>Does the Web SDK have any limitations or constraints for handling multiple 2FA requests?

Each request should be independent but there shouldn't be an issue with multiple users authenticating concurrently or near-concurrently.

>Would implementing post-login 2FA for these flows with the Web SDK require any specific configuration changes or additional considerations beyond the default setup?

The Duo WebSDK and our service isn't going to know if the MFA requests it gets are coming from the initial log in to your application or from these elevated actions. I guess the one config you might want to warn against is using any Duo policy setting that allows bypassing MFA prompts i.e. if someone uses remembered devices and chooses to remember the device for initial app login MFA, that remembered device session could make them skip an active MFA approval for an administrative action, or if someone configures an authorized networks IP or IP range that skips MFA then the users also wouldn't perform active MFA approval for an administrative action, etc.

>If we decide to add mobile support for login
Should be fine as long as your mobile app can handle the redirect to Duo for MFA as well. Here's a Duo KB article with some advice about Duo's MFA prompt, the ability to use WebAuthn authenticators, and various mobile webviews: https://help.duo.com/s/article/8433.

Duo, not DUO.
Quick Links