Knowledge Base
DUO: Securing Logins to the MSP Process Platform Using the DUO Mobile App Account Management and Security
Introduction
DUO (https://duo.com) is a popular identity verification platform. You can use it in MSP Process to acheive two goals:
- To secure the login process of anyone looking to access your MSP Process account at https://app.mspprocess.com. This capability requires the DUO Web SDK to be configured.
- During the end-user verification process; DUO can be used instead of sending the user a verification code via e-mail or SMS. This capability requires the DUO Auth API and Admin API to be configured. Click here for the KB article that outlines how to set this up.
This KB article will take you through all of the steps required to do the first scenario - to use DUO to secure how your technicians login to the MSP Process platform.
Step 1: Configuring the Web SDK Entity in DUO
What is the DUO Web SDK? The Duo Web SDK adds the two-factor authentication screens and workflow to the MSP Process login flow.
How is the Web SDK Used? This module only needs to be setup if you want to use DUO to secure how you and your techs login to the MSP Process platform. It is not required if you only plan on using DUO for End-User Verification.
- Login to the DUO Admin portal (https://admin.duosecurity.com/)
- From the left-hand menu, navigate to Application -> Protect an Application
- Search for "Web SDK" in the Search field
- Click on the Protect button beside Web SDK
- In the Details section, copy the Client ID, Client Secret and API Hostname; you'll need them later
- In the Settings section, change Name field to say "MSP Process"
- Under the Universal Prompt section, choose the Show traditional prompt option
- Click Save
- When prompted, choose No, thanks - you don't want to use the Universal prompt.
Step 2: Integrating MSP Process with DUO
- Login to the MSP Process portal (https://app.mspprocess.com)
- Navigate to Integrations -> Security Integrations
- Click the Add new integration button
4. Click the DUO Web SDK button; specify a name, and then enter the Integration Key, Secret Key and API Hostname from Step #2.
5. Click Submit when you're done.
Step 3: Configuring Your MSP Process User Account To Use DUO During The Login Process
- From the MSP Process UI, click on the Profile button in the top right-hand corner of the UI
- Enable the Link DUO feature
- Follow the on-screen prompts from DUO that will link your MSP Process account to DUO
- Once you've gone through the DUO screens, and have been returned to the MSP Process UI, click Submit
Congratulations! You're Done!
You've now setup the required entities in DUO and configured MSP Process with the information it needs to start using DUO to secure the login process to your MSP Process UI.
Roles and Permissions in MSP Process Account Management and Security
Roles:
There are two Roles in MSP Process - Admin, and Technician. By default, users who are invited to the platform are given the Technician role. Here are the differences between the two Roles:
The Admin Role... | The Technician Role.... |
|
|
Permissions:
There are two permissions that can be applied to any User in MSP Process, regardless of what Role (Admin or Technician) they have been assigned:
- The Use MFA option forces that user to setup MFA
- The Allow Access to UI option offers you two choices:
- If Disabled, the user can only login to the ConnectWise/Halo/Autotask pod, and cannot login to the main https://app.mspprocess.com website
- If Enabled, the user can login to both the ConnectWise/Halo/Autotask pod and the main https://app.mspprocess.com website
Editing The Roles/Permissions of a User:
To edit a user's Role, or the Permissions assigned to that user, navigate to the Teams -> Users page, and then click the pencil icon for that user:
You'll then be presented with a screen that will allow you to edit that user's Roles and Permissions:
Using DUO's "Traditional" Login Prompt Account Management and Security
Context:
Recent changes made by DUO have made it so that their Universal Prompt cannot be rendered in an iframe. The main UI of the MSP Process platform is not affected by this change, but our PSA-embedded Pod (ConnectWise and Halo PSA) and Insight (Autotask) are affected, as they are iframes within the UI of those PSA platforms.
This KB article guides you through how to change your DUO configuration for MSP Process to use DUO's "traditional" prompt, which will allow you to continue to securely login to the MSP Process Pod/Insight when you've chosen to use DUO as your MFA provider.
Instructions:
- Login to your DUO admin panel (the URL will be something like https://admin-.duosecurity.com/ )
- Click on the Applications menu
- Find the Web SDK entry for MSP Process, and edit it
- Under the Universal Prompt section, choose the Show traditional prompt option
- At the bottom of the page, click the Save button
Conclusion:
You've now successfully configured your DUO tenant to use their traditional promp for the MSP Process platform. You'll find that your login experience does look different, as DUO's traditional prompt has a different look and feel:
Configuring and Securing Single Sign-on (SSO) with Microsoft 365 Account Management and Security
Introduction
Microsoft Entra is a popular external Identity Provider (external IDP) that can be used to authenticate your technicians when they login to the MSP Process platform. The goal of this KB article is to walk through how to setup Single Sign-on (SSO) between the MSP Process platform and Microsoft Entra, to review what's created in your Azure tenant when you configure Microsoft Entra as an external IDP, and to outline some additional settings that you can configure to further secure this capability.
Linking the MSP Process Platform to Microsoft Entra
When you first login to the MSP Process platform, a wizard will prompt you to setup the integration with Microsoft:
The first person to take this step will be asked to install the MSP Process Enterprise Application - this Application is what facilitates an SSO login. You'll want to make sure that the Microsoft identity you use during this first step has sufficient rights to install Enterprise Apps in your M365 tenant.
Once that process has been completed, you'll have an "MSP Process" Enterprise Application in your Microsoft Azure environment:
When your colleagues then login to MSP Process, and they also link their MSP Process account to Microsoft using our Setup Wizard, they will (regardless of their permissions in Microsoft 365) have their account successfully linked to their identity in Microsoft 365.
Further Securing the MSP Process Enterprise Application by Requiring User Assignment
By default a newly-created Enterprise Application in Microsoft Azure does not have the Assignment Required option enabled. This means that any user in Entra can - if they have the correct credentials - login to the MSP Process application using their Microsoft Entra credentials. By enabling the Assignment Required option, you can limit access to the MSP Process platform to only the users in your organization who require access to it.
- Sign in to the Microsoft Azure portal.
- Using the search field at the top of the page, look for Enterprise Applications.
- Click on the MSP Process application.
- Navigate to the Manage -> Properties tab
- Enable the Assignment Required option
- Click Save to save the change to the Application
- Navigate to the Manage -> Users and Groups tab
- Click the Add User/Group button to assign the appropriate users to the MSP Process application
That's it! You've now limited who can login to the MSP Process platform to only those in your organization who should have access to it.
Further Securing the Enterprise Application by Applying a Conditional Access Role
Limiting who can login to the MSP Process platform by requiring them to be explicitly assigned to the Enterprise Application in Azure is an excellent step. There's a further step that can be taken, which is to apply the Require phishing-resistant multifactor authentication for administrators Conditional Access Policy. Applying this policy ensures that only users who have already authenticated to Microsoft Entra using both a password and a phishing-resistant method of MFA - such as Windows Hello for Business, a FIDO2 security key, or Microsoft Entra certificate-based authentication - are able to login to the MSP Process platform. More details on phishing-resistant MFA can be found in this Microsoft KB article.
Instructions from Microsoft on what the Conditional Access Policy does and how it can be configured are available here. The steps specific to the MSP Process platform are:
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Protection > Conditional Access.
- Select Create new policy.
- Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
- Under Target resources > Cloud apps > Include, select the MSP Process Enterprise Application.
- Under Access controls > Grant, select Grant access, Require authentication strength, select Phishing-resistant MFA, then select Select.
- Confirm your settings and set Enable policy to Report-only.
- Select Create to create to enable your policy.
IP Address info for MSP Process Account Management and Security
FQDNs:
If you need to whitelist our IP or domains they are shown below:
IP address for https://app.mspprocess.com and https://pod.mspprocess.com:
20.118.48.12
API / App Bots / Live Chat/ Client Portal Outbound IP Address:
64.236.54.139