Duo SSO OAuth2 Provider for Laravel Socialite
Requires
- php: ^8.2
- ext-json: *
- socialiteproviders/manager: ^4.8
This package is auto-updated.
Last update: 2026-03-23 02:16:51 UTC
README
composer require socialiteproviders/duo
Installation & Basic Usage
Please see the Base Installation Guide, then follow the provider specific instructions below.
Prerequisites
Before you begin, you must have:
- Duo SSO configured - You need a Duo Premier, Advantage or Essentials plan with Single Sign-On enabled
- OIDC Application created in Duo Admin Panel:
- Navigate to Applications -> Protect an Application
- Select Generic OIDC Relying Party
- Configure your application and obtain the Client ID and Client Secret
- Duo SSO subdomain - Your custom subdomain or the default one assigned to your account
Refer to the Duo SSO for OIDC documentation for detailed setup instructions.
Add configuration to config/services.php
'duo' => [ 'client_id' => env('DUO_CLIENT_ID'), 'client_secret' => env('DUO_CLIENT_SECRET'), 'redirect' => env('DUO_REDIRECT_URI'), 'domain' => env('DUO_DOMAIN'), // Custom Duo SSO subdomain ],
Add environment variables
Add these to your .env file:
DUO_CLIENT_ID=your_client_id_from_duo_admin_panel DUO_CLIENT_SECRET=your_client_secret_from_duo_admin_panel DUO_REDIRECT_URI=https://yourdomain.com/auth/duo/callback DUO_DOMAIN=custom-subdomain.sso.duosecurity.com
Note: For the DUO_DOMAIN, you can use either:
- Full domain:
acme.sso.duosecurity.com - Just subdomain:
acme(automatically becomesacme.sso.duosecurity.com) - Full URL:
https://acme.sso.duosecurity.com
Add provider event listener
Laravel 11+
In Laravel 11, the default EventServiceProvider provider was removed. Instead, add the listener using the listen method on the Event facade, in your AppServiceProvider boot method.
- Note: You do not need to add anything for the built-in socialite providers unless you override them with your own providers.
Event::listen(function (\SocialiteProviders\Manager\SocialiteWasCalled $event) { $event->extendSocialite('duo', \SocialiteProviders\Duo\Provider::class); });
Laravel 10 or below
Configure the package's listener to listen for SocialiteWasCalled events.
Add the event to your listen[] array in app/Providers/EventServiceProvider. See the Base Installation Guide for detailed instructions.
protected $listen = [ \SocialiteProviders\Manager\SocialiteWasCalled::class => [ // ... other providers \SocialiteProviders\Duo\DuoExtendSocialite::class.'@handle', ], ];
Configure OIDC Application in Duo Admin Panel
When creating your Generic OIDC Relying Party application in Duo:
- Navigate to Applications -> Application Catalog
- Search for "Generic OIDC Relying Party"
- Click Add to create the application
- Under Scopes & Claims, configure:
- Enable
openidscope (required - providessubclaim) - Enable
profilescope (providesname,preferred_username,picture, etc.) - Enable
emailscope (providesemailclaim) - Map each claim to the appropriate attribute from your authentication source
- Enable
About Claims: Duo SSO acts as a bridge between your authentication source (AD/SAML/Duo Directory) and your application. The claims sent to your application come from the attributes in your authentication source. For example:
emailclaim maps to the<Email Address>default attributenameclaim maps to the<Display Name>default attribute- Additional mappings can be configured in the Duo Admin Panel
For more information, see Duo's OIDC documentation.
Configure Redirect URI
In your Duo Admin Panel, add your callback URL to the OIDC application's allowed redirect URIs:
- Navigate to your OIDC application in the Duo Admin Panel
- Scroll to Client Flow Configuration -> Sign-In Redirect URLs
- Add:
https://yourdomain.com/auth/duo/callback - Click Save
Usage
You should now be able to use the provider like you would regularly use Socialite (assuming you have the facade installed):
return Socialite::driver('duo')->redirect();
Callback Example
use Laravel\Socialite\Facades\Socialite; Route::get('/auth/duo/callback', function () { $user = Socialite::driver('duo')->user(); // $user->token // $user->id // $user->name // $user->email });
Returned User fields
The provider maps standard OpenID Connect claims to Socialite user fields. With the default scopes (openid, profile, email):
id- User's unique identifier (fromsubclaim per OIDC spec)nickname- User's username (frompreferred_usernameoremailclaim)name- User's full name (fromnameclaim)email- User's email address (fromemailclaim)avatar- User's profile picture URL (frompictureclaim)
Note: Duo SSO implements OpenID Connect and follows the OpenID Connect Core 1.0 specification for standard claims. The actual claims available depend on:
- Which scopes you request (
openid,profile,email, etc.) - The claim mappings configured in your Duo Admin Panel
- The attributes available from your authentication source (Active Directory, SAML IdP or Duo Directory)
Duo SSO passes through the attributes from your authentication source to the OIDC claims based on your application's configuration.
Optional: Custom Scopes
By default, the provider requests openid, profile and email scopes. You can customize these:
return Socialite::driver('duo') ->scopes(['openid', 'profile', 'email', 'groups']) ->redirect();
Available scopes depend on your Duo SSO OIDC application configuration in the Duo Admin Panel.
Testing Integration
To see exactly which claims your Duo SSO instance returns:
Route::get('/auth/duo/callback', function (): void { $user = Socialite::driver('duo')->user(); dd($user->getRaw()); });
This will show you all available claims from Duo's UserInfo endpoint for your specific configuration.