View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

duo

SEC0431 - Duo Policy (Part 2)

The video introduces you to the basic configuration of Duo Policy. Policy is used to provide granular control to application. We will explore Global Policy, Custom Policy, and Group-Level Policy and use them to restrict application access to some users. We will test web-based app and RADIUS VPN app.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0431 - Duo Policy (Part 1)

The video introduces you to the basic configuration of Duo Policy. Policy is used to provide granular control to application. We will explore Global Policy, Custom Policy, and Group-Level Policy and use them to restrict application access to some users. We will test web-based app and RADIUS VPN app.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0430 - Duo Administration (Part 2)

The video shows you how to manage Duo administrative users. We will begin by configuring and testing password policy and admin roles on Duo local admin accounts. We will then try to leverage integration with Duo SSO to help user avoid having separate login credential. The lab finishes on the topic of Administrative Unit as a way to group managed objects.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0430 - Duo Administration (Part 1)

The video shows you how to manage Duo administrative users. We will begin by configuring and testing password policy and admin roles on Duo local admin accounts. We will then try to leverage integration with Duo SSO to help user avoid having separate login credential. The lab finishes on the topic of Administrative Unit as a way to group managed objects.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0429 - Duo AnyConnect VPN with RADIUS (Part 3)

The video demonstrates different implementation options to integrate Duo with Cisco Secure Client (AnyConnect) VPN using RADIUS protocol. We will be configuring and testing using Duo Authentication Proxy as a standalone RADIUS server, in conjunction with Cisco ISE, and strictly to provide MFA with certificate-based authentication.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0429 - Duo AnyConnect VPN with RADIUS (Part 2)

The video demonstrates different implementation options to integrate Duo with Cisco Secure Client (AnyConnect) VPN using RADIUS protocol. We will be configuring and testing using Duo Authentication Proxy as a standalone RADIUS server, in conjunction with Cisco ISE, and strictly to provide MFA with certificate-based authentication.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0429 - Duo AnyConnect VPN with RADIUS (Part 1)

The video demonstrates different implementation options to integrate Duo with Cisco Secure Client (AnyConnect) VPN using RADIUS protocol. We will be configuring and testing using Duo Authentication Proxy as a standalone RADIUS server, in conjunction with Cisco ISE, and strictly to provide MFA with certificate-based authentication.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0428 - Duo AnyConnect VPN with SSO (Part 3)

The video looks into an integration of Cisco Secure Client (AnyConnect) with Duo SSO. We will enable SAML on Cisco Firepower device via FMC to authenticate our VPN user using Duo SSO/MFA. We will also look at having Duo assist with user authorization. Our example is to have Duo return a user group policy attribute and have it applied to the user via DAP.The lab finishes with a discussion of Default OS Browser.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0428 - Duo AnyConnect VPN with SSO (Part 2)

The video looks into an integration of Cisco Secure Client (AnyConnect) with Duo SSO. We will enable SAML on Cisco Firepower device via FMC to authenticate our VPN user using Duo SSO/MFA. We will also look at having Duo assist with user authorization. Our example is to have Duo return a user group policy attribute and have it applied to the user via DAP.The lab finishes with a discussion of Default OS Browser.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0428 - Duo AnyConnect VPN with SSO (Part 1)

The video looks into an integration of Cisco Secure Client (AnyConnect) with Duo SSO. We will enable SAML on Cisco Firepower device via FMC to authenticate our VPN user using Duo SSO/MFA. We will also look at having Duo assist with user authorization. Our example is to have Duo return a user group policy attribute and have it applied to the user via DAP.The lab finishes with a discussion of Default OS Browser.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - duo