Skip to content

Offline Enrollment — Duo

Monitor NTP health on every device that stores offline seeds. Implement a grace window (e.g., 3 intervals of 30 seconds) on the gateway. 3. Brute-Force on the Endpoint The offline seed database resides on the gateway’s local disk. If an attacker compromises the gateway (e.g., a stolen laptop running Duo Windows Logon), they can extract the encrypted seed file and attempt offline brute force against the encryption key.

Let’s tear down the mechanism of how offline enrollment actually works, why it is cryptographically tricky, and how to audit it properly. Standard Duo MFA requires the user’s device (phone, token, or WebAuthn key) to talk to Duo’s cloud. Offline mode flips this model. Instead of the server validating the OTP, the client (e.g., a laptop running Duo RDP or a VPN concentrator) must validate the token locally.

Offline access doesn’t eliminate the need for an internet connection to Duo—it just pushes the enrollment window earlier in time. Secure that window. Have you experienced a failure during offline enrollment? Share your story in the comments below.

For organizations relying on Duo Security for MFA, the fear is universal: what happens when the internet goes down, the VPN gateway fails, or an employee is traveling without cellular service? The standard answer is . But the process that makes that possible— Offline Enrollment —is often misunderstood, leading to security gaps or deployment failures.

By [Author Name]

Use Duo’s "Offline Access Management" API to purge seeds. Automate offline enrollment expiration (e.g., 7 days max). 2. The Time Drift Catastrophe TOTP depends on accurate clocks. If a gateway’s clock drifts more than 90 seconds from real time, all offline authentications will fail. This is a common failure after a power outage or NTP misconfiguration.