cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1299
Views
1
Helpful
11
Replies

Deny external access to shared/ service accounts

mikeymike20
Level 1
Level 1

Hi all, Sorry if this has been asked before!

im looking for the correct way to manage shared or general O365 email accounts scanner@ dispatch@ etc . These are accounts used for users or devices who don’t have a phone or 2FA token. I would like them to be used within the trusted network without authentication prompt, if accessed from outside the network then deny completely

currently they are synced from AD and exisit as not authenticated within Duo

many thanks
Mike

1 Accepted Solution

Accepted Solutions

DuoKristina
Cisco Employee
Cisco Employee

The Authorized Networks policy setting for Access and Beyond Duo plans has a “Deny access from all other networks”, so what you want could be implemented like…

  1. Create a group in Duo with these shared accounts as members (if you are syncing these accounts into Duo that means creating a group in your source directory with these accounts as members and then adding that group to your sync to import it into Duo.

  2. Apply a custom group policy to whichever Duo application protects O365 access (Azure CA, O365+DAG, M365+Duo SSO, etc). The group policy should target the group of these service accounts you imported into Duo in step 1, and in that policy configure the Authorized Networks setting to allow access from your trusted network and deny access from other networks.

Duo, not DUO.

View solution in original post

11 Replies 11

DuoKristina
Cisco Employee
Cisco Employee

The Authorized Networks policy setting for Access and Beyond Duo plans has a “Deny access from all other networks”, so what you want could be implemented like…

  1. Create a group in Duo with these shared accounts as members (if you are syncing these accounts into Duo that means creating a group in your source directory with these accounts as members and then adding that group to your sync to import it into Duo.

  2. Apply a custom group policy to whichever Duo application protects O365 access (Azure CA, O365+DAG, M365+Duo SSO, etc). The group policy should target the group of these service accounts you imported into Duo in step 1, and in that policy configure the Authorized Networks setting to allow access from your trusted network and deny access from other networks.

Duo, not DUO.

thanks for that - its on the right lines as i was thinking but am i right to assume that the account has to be enrolled? If so how is this best way to do this without a mobile phone or hardware key ?

thanks for your time

The accounts that you want to bypass Duo MFA when connecting from the internal trusted network do not need to be enrolled in Duo if you do not check the “Require enrollment from these networks” option in the authorized networks policy, as described in the documentation I linked in the earlier response.

Duo, not DUO.

mikeymike20
Level 1
Level 1

thanks again Kristina - im obviously getting something wrong.

the test user is showing in the portal as ‘Active’ the group he’s a member of the new ‘service accounts’ group only - this is synced and shown in duo , ive attached the global & custom policy. When i login as that user from out of a trusted IP it just prompts me to setup Duo , i can add a mobile then it logs in


What is it like on the Microsoft side? Does it require 2FA and how is that set up? My domain is federated within Microsoft and directed to use Duo MFA.

Be sure to uncheck “solved” because it thinks @DuoKristina’s answer is the solution and the post then becomes somewhat less active. Obviously, it’s not solved.

Ah, ok.

So in Duo an “enrolled” user is a user that is known to Duo (username exists) and has an associated authentication device (able to complete 2FA).

A user that is known to Duo but has no devices is partially enrolled. Duo doesn’t care for this state because the user can’t complete 2FA, so it will have partially enrolled users try to complete enrollment.

When I answered the second question about enrollment in the networks policy, I forgot that I had already recommended creating the users in Duo to be able to apply a group policy to them (because you don’t want all users on that network to get in without 2FA and blocked elsewhere, right?

So yeah, you need a dummy authenticator on those service account users in Duo to get them into fully enrolled state.

Duo, not DUO.

mikeymike20
Level 1
Level 1

Ah OK thanks to both…this sounds like where my confusion is. I shall go ahead and find a device to complete the authentication.

Mike

Like, if you just go into the Duo Admin panel and attach a phone to one of those service account users with a fake number like 213-555-1212, that completes enrollment and then the service account should slide right in past Duo.

Duo, not DUO.

mikeymike20
Level 1
Level 1

Thank you , that has now worked as required. Allowing access with no prompt ‘inside’ the network, straight deny from everywhere else

Glad to hear it! Thanks for following up.

Duo, not DUO.

mikeymike20
Level 1
Level 1

Just for anyone else in the same situation… this can be achieved as per above if you have the correct Duo Plan (Access / Beyond) . If you have the Duo MFA plan you cannot block other networks except trusted. What i did was to create a new policy for the users to

Deny access to unenrolled users (new user policy)
Require 2FA or enrollement (Auth Policy)
Enable authorised networks (customers IP’s)
uncheck all options for authentication methods

set the policy to the application , create a AD group (ie deny external access), add required users and sync. - i didn’t bother adding a device to any user in this group.

now they can access applications within trusted network without duo prompt , access external shows a Duo denied message

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Quick Links