Skip to main content



Cisco Defense Orchestrator

Configure Duo RADIUS Secondary Authentication

These instructions walk you through adding two-factor authentication via RADIUS to your FTD using CDO. The instructions also assume you already have a functioning FTD Remote Access SSL VPN deployment using an existing AAA authentication server (like an on-premises AD/LDAP directory).

Create a Duo Account

Following is an overview of the process. For details, please see the Duo web site,

  1. Sign up for a Duo account.
  2. Log in to the Duo Admin Panel and navigate to Applications.
  3. Click Protect an Application and locate Cisco Firepower Threat Defense VPN in the applications list.
  4. Click Protect this Application to get your integration key, secret key, and API hostname. You'll need this information when configuring the proxy. For help, see the Duo Getting Started guide,
  5. Install and configure the Duo Authentication Proxy. For instructions, see the "Install the Duo Authentication Proxy" section in
  6. Start the Authentication Proxy. For instructions, see the "Start the Proxy" section in

    For enrolling new users in Duo, see  

Configure FTD for Duo RADIUS Using CDO

  1. Configure FTD Radius Server Object. 
    1. In the CDO navigation menu, click Objects > RA VPN Objects (ASA & FTD) > Identity Source.
    2. Provide a name and set the Device Type as FTD.
    3. Select Radius Server Group and click Continue. For details, see step 6 in Create or Edit an FTD RADIUS Server Group.
    4. In the Radius Server section, click the Add button blue_cross_button.png and click Create New Radius Server. See Create or FTD RADIUS Server Object.
      Note: In the Server Name or IP Address field, enter your Duo Authentication Proxy server's fully-qualified hostname or IP address.

    5. Once you have added the Duo RADIUS server to the group, click Add to create the new Duo RADIUS server group.

  2. Change the Remote Access VPN Authentication Method to Duo RADIUS. 
    1. In the CDO navigation menu, click VPN > Remote Access VPN Configuration.
    2. Expand the VPN configuration and click on the connection profile to which you want to add Duo.
    3. In the Actions pane on the right, click Edit.
    4. Select the Authentication Type can be AAA or AAA and Client Certificate.  
    5. In the Primary Identity Source for User Authentication list, select the server group you created earlier.

    6. You typically do not need to select an "Authorization Server" or "Accounting Server".
    7. Click Continue.
    8. In the Summary and Instructions step, click Done to save the configuration.  
  1. Review and deploy now the changes you made, or wait and deploy multiple changes at once.
  • Was this article helpful?