Authentication & User Management
-
- Identity Provider (IdP): The Foundation of Sastrify Insights
- Uncover SaaS Usage and Shadow IT with Identity Provider (IdP) Discovery
- Integrating HRIS to Enrich Identities & Insights
- Admin Guide: Deploying the Sastrify Chrome Extension
- Admin Guide: Deploying the Sastrify Microsoft Edge Extension
- Manual Installation Guide: Sastrify Chrome Browser Extension
- Manual Installation Guide: Sastrify Edge Browser Extension
- Setting renewal dates & reminders
- Assigning & Modifying Subscription Owners
- Uploading & Managing Your SaaS Documents in Sastrify
- Sastrify App Support: Get Help & Give Feedback
- Sastrify's commitment to security and privacy standards
-
- Capturing Subscription Details with Contract AI
- Adding a New Subscription Manually
- Slack Integration: Bringing Sastrify into Your Internal Communication
- How to bulk upload your invoices
- Automating Document Uploads via Email Forwarding
- Managing Your Notification Preferences
- Tools and Spend Importer: Bulk Upload & Visualization
- Tool Matching: Aligning ERP Data with Your Inventory
- Managing Collaboration with Custom Tasks
- Task Automation: Standardizing and Automating Routine Actions
-
- Workflows: Automate procurement processes with consistency
- Requests: Streamline procurement process and internal approval
- Get expert procurement support for new purchases and renewals
- How to submit and track Procurement Requests via Jira Integration
- Scope of service: Custom benchmarking & contract review
- Scope of service: Negotiation & renewal support
- Scope of service: Custom SaaS Optimization Advisory
- Purchase your SaaS through the SastriMarket
-
- Connecting Your ERP & Accounting Software
- Spend Import: Validate and fine-tune your imported spend data
- Export spend data from Candis to Sastrify
- Export spend data from Spendesk to Sastrify
- Export spend data from Pleo to Sastrify
- Export spend data from Moss to Sastrify
- Export spend data from DATEV to Sastrify
- Export spend data from Ramp to Sastrify
-
- Configuring Authentication & Access
- User Management: Managing Users and Platform Roles
- Configuring Microsoft SSO Authentication
- Configuring Okta SSO Authentication
- Configuring JumpCloud SSO Authentication
- Configuring Cisco Duo SSO Authentication
- Configuring Cloudflare SSO Authentication
- Configuring OneLogin SSO Authentication
- Having trouble logging in?
-
- Okta Identity Provider (IdP) Integration Guide
- Accounting & ERP: Connecting NetSuite to Sastrify
- Accounting & ERP: How to connect Quickbooks
- Accounting & ERP: How to connect Microsoft Dynamics 365
- Accounting & ERP: How to connect Workday ERP
- Accounting & ERP: How to integrate Pleo with Sastrify
- HRIS: Connecting Officient to Sastrify
-
- ERP & Accounting Integration FAQs
- SSO / IDP Discovery Integration FAQs
- Browser Extension FAQs
- HRIS Integration FAQs
- Usage Analytics FAQs
- Contract AI & Subscription Details FAQs
- Tools and Spend Importer FAQs
- Invoices FAQs
- Achieved Savings FAQs
- Form component guide for Sastrify form builder
- What is SaaS and Sastrify's scope of work?
- Who receives the renewal alerts or reminders?
- How does Sastrify work with currencies?
- Is the spend data from accounting export always up-to-date?
- How to work with benchmark prices
- When and how to involve Sastrify in a contract evaluation or negotiation?
- How does Sastrify interact with SaaS vendors?
- How do you handle confidentiality clauses in vendor contracts?
- Why is contract data essential for benchmarking and negotiation support?
Configuring Cisco Duo SSO Authentication Print
Modified on: Tue, 24 Feb, 2026 at 12:49 PM
This guide walks you through setting up Cisco Duo single sign-on (SSO) for logging into Sastrify.
Each step is outlined below.
IN THIS ARTICLE
- Step 1: Select the login method in Sastrify
- Step 2: Create a Generic SAML Service Provider application in Duo
- Step 3: Send credentials to Sastrify
- Step 4: Update your application and complete configuration in Duo
- Step 5: Confirm setup and testing
Step 1: Select the login method in Sastrify

- Go to: Settings > Authentication & Access.
- Select "Login with Cisco Duo".
- Click "Enable SSO".
After you click Enable SSO, you'll see a confirmation message. This also triggers an email from Sastrify with instructions to provide your Cisco Duo credentials, which you’ll need to complete the setup in Step 3.
Step 2: Create a Generic SAML Service Provider application in Duo
- Sign in to your Duo Admin Portal using your admin account.
- Navigate to Applications > Application Catalog.

- Locate the entry for Generic SAML Service Provider with the "SSO" label in the catalog
- Click the + Add button to start configuring Generic SAML Service Provider.

- Go to the Metadata section, where you can get SAML identity provider information about Duo Single Sign-On to provide to Sastrify.
- Cisco Duo will automatically generate a single sign-on URL and idP certificate.
- Copy the URL, download the certificate, and proceed to the next step.

The certificate will be used by Sastrify to validate the signature on the SAML response sent by Duo Single Sign-On. Click the Download Certificate button to download a crt file.
Step 3: Send credentials to Sastrify
Reply to the email from Step 1 and include:
Single Sign-On URL
IdP Certificate
Once received, Sastrify will send back the following configuration values needed to complete the setup.
- Entity ID, e.g., urn:auth0:sastrix:<company_name>-CISCODUO-SSO-PROD
- ACS URL, e.g., https://login.sastrify.com/login/callback?connection=<company_name>-CISCODUO-SSO-PROD
- Single Logout URL, e.g., https://login.sastrify.com/logout
Step 4: Update your application and complete configuration in Duo
Once you receive the final configuration values from Sastrify:
Return to the application page in your Duo Admin Panel.
Leave the drop-down set to None (manual import) to populate the fields by copying information from Sastrify and pasting it into the Duo Admin Panel.
Enter the IdP Entity ID, SP Entity ID, and ACS URL as provided into the Service Provider section.

- Under the SAML Response section, set the following values:
- NameID Format: nameid::format::emailAddress
- NameID Attribute: <Email Address>
- Signature Algorithm: SHA256
- Map the required SAML attributes according to your organization's identity setup.

- Scroll down to the bottom of the page and click Save.
Once saved, your Cisco Duo SSO integration will be complete.
Step 5: Confirm setup and testing
To finalize, reply to the same email thread and confirm that you’ve completed the SSO configuration in Cisco Duo.
Our support team can run a quick test on your behalf to ensure that authentication is working as expected.
Did you find it helpful? Yes No
Send feedback