
Support
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Qlik Cloud: How to set up Cisco Duo as an Identity Provider
Last Update:
Nov 6, 2023 3:35:28 AM
Updated By:
Created date:
Oct 30, 2023 10:44:26 PM
This customization is provided as is. Qlik Support cannot provide continued support of the solution. For assistance, reach out to our Professional Services or engage in our active Integrations forum.
This article explains how to set up Cisco Duo as an Open ID Connect (OIDC) Identity Provider to authenticate to Qlik Cloud.
Set up Cisco Duo
- in Cisco Duo, go to Application and create a new application.
- Set Grant Type to Authorization Code
- Allow PKCE only authentication remains unchecked.
- Access Token Lifetime can be set to 60
- Set Sign-in Redirect URLs to your Qlik Cloud tenant URL, appending /login/callback. Do not use the alias.
Example: https://<TENANT URL>.<REGION>.qlikcloud.com/login/callback
If you don't recall the original tenant URL, open https://<TENANT URL>.<REGION>.qlikcloud.com/api/v1/tenants in a browser tab to locate it. - In the Scopes section:
- Verify that openid is set as the scope
- Check profile and set the following claim:
- IdP Attribute: <Display Name>
- Claim: name
- IdP Attribute: <Display Name>
- Check email and set the following claim:
- IdP: <Email Address>
- Claim: email
- IdP: <Email Address>
- Set a Name
- Uncheck Let users remove devices, add new devices, and reactive Duo Mobile
- If required, limit who can authenticate through this application (Users in the organization that will be able to log in to Qlik Cloud).
To do so, check Only allow authentication from users in certain groups and choose the required group.
Set up Qlik Cloud
- Log in to the Qlik Cloud Management Console and navigate to Identity Provider
- Create a new Identity Provider
- Type: Interactive
- Provider: Generic
- Input the OpenID Connect Metadata URI as created in Cisco Duo
The Metadata URI can be found under Discovery URL in the application created previously in Cisco Duo. - Input the Client ID as created in Cisco Duo
- Input the Client Secret as created in Cisco Duo
- Leave Realms (optional) blank
- sub is set to sub
- Click Create and Save
- Click Validate
After clicking Validate and logging in to Cisco Duo, confirm that claim mapping is correct and make the user a Tenant Admin so that you can still access the management console after activating Cisco Duo as an Identity Provider.
Once Cisco Duo has been activated as your new IdP, the Invite User option will be disabled in your Management Console as users will now be managed by your new Identity Provider. See Identity providers.
Environment
1,296 Views
Comments

Contributor
2023-10-31
02:09 PM
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Thanks a lot, it worked!

Partner - Contributor II
2025-02-06
12:09 PM
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
HI @Damien_V Is there a way we can groups through this OIDC Setup in Duo, Is there recommended steps around that? Or would you recommend SAML configuration with DUO for the same.