Table of Contents | ||||||
---|---|---|---|---|---|---|
|
...
Overview
Duo Security is a powerful access security platform. There are two ways of sending Duo logs to Devo automatically:
Duo collector - Collector deployed by Devo. If you want to use this option to deploy the collector, contact us.
Duo Log Sync - Python library developed by Duo Security. To start sending Duo logs to Devo using this library, follow the steps below.
...
Getting the required credentials
Access the Duo Admin Panel and follow these steps:
Rw ui steps macro | ||||
---|---|---|---|---|
Create an Admin API application in the Duo Admin Panel.
Add the required permissions for the collector.
Get your integration key, secret key, and API hostname.
Once you have these three values, go to the following section if you're using Duo Log Sync utility, or contact us if you want us to set up the Duo collector to send your logs. |
...
Devo relay rules
Set up 4 custom relay rules for these tables:
Note |
---|
Administrator Login rule (#1) needs to be placed before Administrator Events rule (#2), since we want events with Authentication and Telephony events rules use the same basic settings as the Administrator events rule (just different port and tag). |
auth.duo.administrator.login
(foradmin_
actions)
...
auth.duo.administrator.events
...
auth.duo.authentication.events
...
auth.duo.telephony.events
...
Duo Log Sync settings
Rw ui steps macro | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Edit the
Execute this command:
Check that
|
Validation
After 2 mins, duologsync
will fetch and send logs to Devo (that’s the minimum timeout that Duo allows between API calls). Then, go to Devo and see if you have Duo events in all auth.duo.*
tables. Learn more about these tables in auth.duocloud-based access security provider that offers multi-factor authentication (MFA), endpoint security, and remote access solutions to protect users and their devices against unauthorized access and cyber threats. It is designed to ensure that only authorized users and secure devices can access applications and data, regardless of where the applications or users are located.
Duo collector migration guide
This guide will walk you through the process of updating your configuration from versions <2.0.0 to version 2.0.0. This version introduces significant improvements and changes to the configuration style to enhance performance, usability, and security.
Version 2.0.0 is incompatible with previous versions. The new version needs some adjustments to the configuration file to ensure a smooth migration process. The following sections will guide you through the necessary steps to update your configuration.
Preparing for migration
Before starting the migration process, we recommend the following steps:
Backup your current configuration: Make sure you have a backup of your existing configuration files to prevent any data loss.
Review the new configuration documentation: Familiarize yourself with the new configuration options available in version 2.0.0.
Migration steps
Step 1: Update credentials
An example of the old and new configuration is shown below:
Code Block |
---|
# Old version (<2.0.0)
account:
ikey: 'NQ0XXXABC69XXXXYZI0F'
skey: 'Kqfd1XXXX1bCX42OXXXLxNukWXXXXgUpXXX6KUaT'
hostname: 'api-1a2b3c4d.duosecurity.com' |
Code Block |
---|
# New version (2.0.0)
credentials:
integration_key: NQ0XXXABC69XXXXYZI0F
secret_key: Kqfd1XXXX1bCX42OXXXLxNukWXXXXgUpXXX6KUaT
hostname: api-1a2b3c4d.duosecurity.com |
Step 2: Update start date
An example of the new configuration is shown below:
Code Block |
---|
services:
administrator:
start_datetime_utc: "<start_datetime_utc_value>"
authentication:
start_datetime_utc: "<start_datetime_utc_value>"
telephony:
start_datetime_utc: "<start_datetime_utc_value>" |
The <start_datetime_utc_value>
has the format "YYYY-MM-DDTHH:MM:SS.000Z"
. For example, a valid start_datetime_utc_value would be "2024-07-01T00:00:00.000Z"
.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening pre-processing |
|
Allowed source events obfuscation |
|
Data source description
This collector extracts data from 3 log services available from Duo:
Administrator: Returns a list of administrator log events.
Authentication: Returns a paged list of authentication log events.
Telephony: Returns a list of telephony log events.
Data source | Description | API endpoint | Collector service name | Devo table | Available from release |
---|---|---|---|---|---|
Administrator | Returns a list of administrator log events. |
| administrator |
| v0.9 |
Authentication | Returns a paged list of authentication log events ranging from the last 180 days up to as recently as two minutes before the API request. There is an intentional two-minute delay in the availability of new authentications in the API response. Duo operates a large-scale distributed system, and this two-minute buffer period ensures that calls will return consistent results. Querying for results more recent than two minutes will return as empty. |
| authentication |
| v0.9 |
Telephony | Returns a list of telephony log events. |
| telephony |
| v0.9 |
API limits
Administrator:
Only the 1000 earliest events (maximum) will be returned with each page; the collector will be called multiple times to page through the entire log.
The recommended limit suggests requesting logs no more than once per minute.
Authentication:
Returns a paged list of authentication log events ranging from the last 180 days up to as recently as two minutes before the API request. There is an intentional two minute delay in availability of new authentications in the API response. Duo operates a large scale distributed system, and this two minute buffer period ensures that calls will return consistent results. Querying for results more recent than two minutes will return as empty.
The recommended limit suggests requesting logs no more than once per minute.
Telephony:
Returns a paged list of authentication log events ranging from the last 180 days up to as recently as two minutes before the API request. There is an intentional two minute delay in availability of new telephony events in the API response. Duo operates a large scale distributed system, and this two minute buffer period ensures that calls will return consistent results. Querying for results more recent than two minutes will return as empty.
The recommended limit suggests requesting logs no more than once per minute.
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required for basic data pulling are below.
Note |
---|
This minimum configuration refers exclusively to those specific parameters of this integration. Additional parameters related to the generic behavior of the collector are required. Check the setting sections for details. |
Setting | Details |
---|---|
| The integration key is required to authenticate the requests. The integration key acts as the HTTP username |
| The secret key is required to authenticate the requests. The secret key acts as the HTTP password |
| The hostname is required to authenticate the requests. This is the URL for the different requests |
Accepted authentication methods
Authentication method | Details |
---|---|
| You will need your |
Vendor setup
You need the owner role to perform these steps. Learn more here.
Rw ui steps macro | |||||
---|---|---|---|---|---|
Sign up for a Duo account. If you use a 30-day free Duo Advantage trial, this includes Admin API access.
Log in to the Duo Admin Panel and navigate to Applications.
Click Protect an Application and locate the entry for Admin API in the applications list. Click Protect on the far right to configure the application and get your integration key, secret key, and API hostname. You'll need this information to complete your setup. See Protecting Applications for more information on protecting applications in Duo and additional application options.
Determine the permissions you want to grant to this Admin API application. Refer to the API endpoint descriptions throughout this document for information about required permissions for operations. For these logs, you will need Grant read log API permissions.
Optionally, specify which IP addresses or ranges are allowed to use this Admin API application in Networks for API Access. If you do not specify any IP addresses or ranges, this Admin API application may be accessed from any network. The Admin API performs the IP check after verifying the authentication signature in a request. If you restrict the allowed networks for API access and see logged events for blocked Admin API requests from unrecognized IP addresses, this may indicate a compromise of your Admin API application's secret key. |
Treat your secret key like a password
The security of your Duo application is tied to the security of your secret key (skey
). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!
Connectivity requirements
This application communicates with Duo's service on SSL TCP port 443. Firewall configurations that restrict outbound access to Duo's service with rules using destination IP addresses or IP address ranges aren't recommended, since these may change over time to maintain our service's high availability. If your organization requires IP-based rules, please review Duo Knowledge Base article 1337. Effective June 30, 2023, Duo no longer supports TLS 1.0 or 1.1 connections or insecure TLS/SSL cipher suites. See Duo Knowledge Base article 7546 for additional guidance.