Crewmojo Help
  • Welcome!
  • Getting Started
    • Logging In
      • Troubleshooting Logging In
    • Dashboard
      • Company Logo and Background
    • User Management
      • Adding Users
      • Setting Manager
      • Deactivate User
      • File Notes and Attachments
  • Features
    • Objectives
      • Administration/Configuration
      • User Experience
      • Reporting
      • Frequently Asked Questions
      • Permissions Explanation
    • 1-on-1's
      • Administration/Configuration
      • User Experience
      • Reporting
    • Reviews
      • Administration/Configuration
      • User Experience
      • Reporting
      • Frequently Asked Questions
    • Teams
    • Snapshots
      • Administration/Configuration
      • User Experience
      • Reporting
    • Journeys
      • Frequently Asked Questions
    • Library and Surveys
    • Feedback
      • Mojoscore
    • Reporting
    • Values
    • Documents
    • Announcements
    • Proxy
    • Audiences
    • Themes
  • Integrations
    • Crewmojo API
    • Microsoft 365
      • Teams App
      • Troubleshooting Microsoft 365
    • Google Workspace
    • Okta
      • Okta - Manual Configuration
    • Zoom
    • Slack
      • Slack - Manual Configuration
    • Cisco DUO SSO
    • Single Sign-On
    • Calendar
  • Uploading Users & Teams
    • API
    • App
      • Pre Configured
      • Self Configured
  • Downloading Data & Reports
    • API
    • App
  • Support
    • Browsers
    • Contact
    • Apache Log4j2 Issue
Powered by GitBook
On this page
  • Cisco DUO Set Up
  • Relying Party settings
  • Sign-In Redirect URLs
  • OIDC Response settings
  • Settings section
  • Crewmojo Set Up

Was this helpful?

  1. Integrations

Cisco DUO SSO

How to enable Single-Sign-On (SSO) with Cisco DUO and OpenID Connect

PreviousSlack - Manual ConfigurationNextSingle Sign-On

Last updated 1 year ago

Was this helpful?

To enable Single Sign-On (SSO) with Cisco DUO you will need to configure Crewmojo using the generic OpenID Connect integration and Cisco DUO with the "Generic OIDC Relying Party - Single Sign-On"

This guide assumes you already have a configured Cisco DUO account with an Authentication Source for Single Sign-On and users to test with.

The users from Cisco DUO must have accounts in Crewmojo. This is usually synced from your HRIS or Payroll system. Please ensure this is set up before turning on SSO.

Cisco DUO Set Up

In the admin portal for DUO. Navigate to Applications > Protect an Application. Find "Generic OIDC Relying Party" from the list and click "Protect".

If you don't see "Protect" it is because your DUO authentication source is not properly configured.

The Metadata section is generated by DUO. You will need this later for the Crewmojo side of the set up.

Relying Party settings

Relying Party is set up as follows:

Sign-In Redirect URLs

For Sign-In Redirect URLs, specify the following:

OIDC Response settings

You need to edit the scopes of the OIDC response as follows

Settings section

Set the Name as 'Crewmojo'

Don't forget to Save your changes

Crewmojo Set Up

Back in the Crewmojo application. Ensure you have Admin permissions and navigate to the Company Settings > Integrations tab

Under the OpenID section, fill in the data from the Metadata provided in the Cisco DUO settings as per the above section. You will need to supply:

  • Client ID

  • Client Secret

  • Issuer URL

  • Authorization URL

  • Token URL

  • JWKS URL

After you have supplied all the fields click 'Enable OIDC'

Once this step is completed, you need to set the SSO method at the top of the page to OpenID Connect

https://api.crewmojo.com/v1/sso/oidc
https://api.test.crewmojo.com/v1/sso/oidc