Source code repositories can be the crown jewels of many organizations. For this and many other reasons, it is a higher risk target for adversaries and modern cyber threats. In this configuration example, we will integrate Cisco Secure Access by Duo and GitHub Enterprise to apply Zero Trust policies.
Applying zero trust policies to SaaS solutions typically involves integrating the application via SAML, OIDC, etc. One of my favorite guides on SAML is on the Duo Blog: The Beer Drinker’s Guide to SAML.
TIP If your application is on-premise or doesn't support modern authentication. Zero Trust Network Access(ZTNA) and the Duo Network Gateway(DNG) Allows organizations to perform the same exact user and device trust checks on legacy applications and services. |
To get started, login to your GitHub account and...
NOTE
You need to be an organization owner to have the correct rights and permissions to enable SSO/MFA/SAML for an Organization |
Next, check the box to Enable SAML authentication
Next, login to your Duo account and perform the following steps to add an application for GitHub integration.
Next, Copy configuration details from Cisco Duo and input them into SAML Configuration in Github
Next, Copy configuration details from GitHub's SAML Configuration and input them into Cisco Duo's application configuration
Next, click the Test SAML configuration button on your GitHub page.
CAUTION If your test does NOT succeed, do NOT proceed or click Save as this could lock you out of your organization. |
Finally, check the box to Require SAML SSO authentication for all members of your organization and then click Save.
By integrating GitHub with Duo, you now can use Duo's Adaptive Policy & Control to meet your organization's requirements around zero trust and move your Zero Trust Maturity to optimal for Identity. A few of the top policy items:
Duo integrates with your favorite endpoint and mobile device management tools to determine if the device is managed and trusted.
If you are looking for help with Cisco Duo, MFA, SSO, Zero Trust, etc. Schedule some time to speak with one of our cybersecurity experts.