Authentication Methods & Devices

Authentication Methods & Devices

Learn how Duo works with your existing user store and explore the options for managing your organization's second-factor authentication methods.

rate limit

Code not recognized.

About this course

About this course

Duo Security was founded on the principle of democratizing security for everyone, and to further this mission, we support a variety of authentication methods to suit every organization and every user. This course is designed to help administrators set up a two-factor authentication experience that is intuitive for all users in their organization. Learn more about how our services work with an organization’s existing infrastructure and explore your options by evaluating the devices supported for secondary authentication to your Duo-protected applications. By the end of the course, you should be able to:

  • Summarize how Duo secures the Authentication Process
  • Explain the role and experience of the Duo Prompt during end-user authentication to web-based applications
  • Identify Duo-supported authentication methods
  • Describe the end-user experience for supported authentication devices
  • Locate key authentication management features in the Admin Panel

Curriculum

  • Before you begin...
  • Course Introduction
  • Video: What is 2FA? (1:59)
  • Authentication Prompts
  • The Duo Prompt & Universal Prompt
  • Non-Web Based Applications
  • How to Apply Custom Branding to the Duo Authentication Experience
  • Customizing Authentication Prompt Settings
  • Duo Mobile
  • Duo Mobile Authentication
  • Video: Duo Mobile (0:44)
  • Video: Apple Watch (0:20)
  • Video: Mobile Passcodes - (0:30)
  • Managing Duo Mobile as an Administrator
  • Why Duo Push?
  • Telephony
  • Managing Telephony: SMS & Phone Callback
  • Video: SMS delivered passcodes (0:28)
  • Managing SMS Delivered Passcodes
  • Video: Phone Call - Telephony (0:29)
  • Managing Phone Callback
  • Bypass Codes
  • Video: Bypass Codes (0:36)
  • Managing Bypass Codes
  • Workshop: Hardware Tokens & Security Keys
  • Hardware Tokens & Security Keys
  • Video: Hardware Tokens (0:23)
  • Managing Hardware Tokens
  • Video: U2F Security Keys (0:22)
  • Managing Security Keys: U2F & WebAuthN
  • Final Thoughts
  • Let Duo Work for You
  • Knowledge Check
  • Share Feedback (Optional)
  • Take the next step

About this course

About this course

Duo Security was founded on the principle of democratizing security for everyone, and to further this mission, we support a variety of authentication methods to suit every organization and every user. This course is designed to help administrators set up a two-factor authentication experience that is intuitive for all users in their organization. Learn more about how our services work with an organization’s existing infrastructure and explore your options by evaluating the devices supported for secondary authentication to your Duo-protected applications. By the end of the course, you should be able to:

  • Summarize how Duo secures the Authentication Process
  • Explain the role and experience of the Duo Prompt during end-user authentication to web-based applications
  • Identify Duo-supported authentication methods
  • Describe the end-user experience for supported authentication devices
  • Locate key authentication management features in the Admin Panel

Curriculum

  • Before you begin...
  • Course Introduction
  • Video: What is 2FA? (1:59)
  • Authentication Prompts
  • The Duo Prompt & Universal Prompt
  • Non-Web Based Applications
  • How to Apply Custom Branding to the Duo Authentication Experience
  • Customizing Authentication Prompt Settings
  • Duo Mobile
  • Duo Mobile Authentication
  • Video: Duo Mobile (0:44)
  • Video: Apple Watch (0:20)
  • Video: Mobile Passcodes - (0:30)
  • Managing Duo Mobile as an Administrator
  • Why Duo Push?
  • Telephony
  • Managing Telephony: SMS & Phone Callback
  • Video: SMS delivered passcodes (0:28)
  • Managing SMS Delivered Passcodes
  • Video: Phone Call - Telephony (0:29)
  • Managing Phone Callback
  • Bypass Codes
  • Video: Bypass Codes (0:36)
  • Managing Bypass Codes
  • Workshop: Hardware Tokens & Security Keys
  • Hardware Tokens & Security Keys
  • Video: Hardware Tokens (0:23)
  • Managing Hardware Tokens
  • Video: U2F Security Keys (0:22)
  • Managing Security Keys: U2F & WebAuthN
  • Final Thoughts
  • Let Duo Work for You
  • Knowledge Check
  • Share Feedback (Optional)
  • Take the next step