Duo Security Outage History

Duo Security is up right now

There were 11 Duo Security outages since February 4, 2026 totaling 75h 5m of downtime. Each is summarised below — incident details, duration, and resolution information.

Source: https://status.duo.com

Minor April 30, 2026

Desktop Authenticator Enrollment Degradation

Detected by Pingoru
Apr 30, 2026, 05:54 PM UTC
Resolved
Apr 30, 2026, 06:07 PM UTC
Duration
13m
Affected: Admin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin Panel
Timeline · 3 updates
  1. identified Apr 30, 2026, 05:54 PM UTC

    We are currently addressing an issue impacting desktop authenticator enrollments .A subset of customers may experience intermittent delays or failures during desktop authenticator enrollment. Mitigation actions are in progress and are helping to reduce impact. Core authentication, SSO, and delivery services remain fully operational.

  2. monitoring Apr 30, 2026, 05:57 PM UTC

    Mitigation actions have been implemented. The service has stabilized and recovery is underway. We will continue to monitor to ensure full resolution.

  3. resolved Apr 30, 2026, 06:07 PM UTC

    The issue has been resolved. Services have returned to normal operation, and customers should no longer experience delays or failures. We apologize for any inconvenience caused and thank you for your patience.

Read the full incident report →

Major April 28, 2026

Elevated Authentication Latency in DUO6

Detected by Pingoru
Apr 28, 2026, 02:22 PM UTC
Resolved
Apr 28, 2026, 03:26 PM UTC
Duration
1h 3m
Affected: Core Authentication Service
Timeline · 3 updates
  1. investigating Apr 28, 2026, 02:22 PM UTC

    We are investigating elevated authentication latency affecting customers . Authentication requests are continuing to succeed at this time, but customers may experience slower-than-normal response times and degraded performance during login attempts. Our team is actively working to identify the cause and restore normal performance as quickly as possible.

  2. monitoring Apr 28, 2026, 02:56 PM UTC

    We have applied mitigation steps and are seeing improved authentication performance for customers in the deployment. Authentication latency has decreased, and the service is recovering. Our team is continuing to monitor the environment closely to ensure stability while we investigate the underlying cause.

  3. resolved Apr 28, 2026, 03:26 PM UTC

    The issue causing elevated authentication latency has been fully resolved. Authentication performance has returned to normal levels, and customers should no longer experience delays during login attempts.

Read the full incident report →

Major April 18, 2026

SMS Delivery Failures

Detected by Pingoru
Apr 18, 2026, 04:30 AM UTC
Resolved
Apr 18, 2026, 07:09 AM UTC
Duration
2h 39m
Affected: SMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message DeliverySMS Message Delivery
Timeline · 3 updates
  1. investigating Apr 18, 2026, 04:30 AM UTC

    We are currently detecting an issue with carriers in the US region for SMS delivery. We are currently working with providers to restore the service. In the meantime, please use other means of authentication such as Duo Push.

  2. investigating Apr 18, 2026, 05:39 AM UTC

    We are continuing to investigate the SMS delivery issue impacting all customers in the US region. Push notifications will continue to work as expected. Further updates will be provided as more information becomes available.

  3. resolved Apr 18, 2026, 07:09 AM UTC

    The SMS delivery issue impacting customers in the US region has been resolved. SMS passcode authentication is now functioning normally. We apologize for any inconvenience caused and thank you for your patience.

Read the full incident report →

Notice March 22, 2026

Duo Phone Call Authentication Failure for US Based Carriers

Detected by Pingoru
Mar 22, 2026, 10:13 PM UTC
Resolved
Mar 23, 2026, 02:23 AM UTC
Duration
4h 10m
Timeline · 3 updates
  1. investigating Mar 22, 2026, 10:13 PM UTC

    We are currently observing a recurrence of the issue causing VOIP authentication failures in all deployments in the US region. We are working to correct the issue as soon as possible. While we work to resolve this, please use alternative authentication methods such as Duo Mobile Push, SMS passcodes etc. A full list of available authentication methods can be found here: https://duo.com/docs/policy#authentication-methods

  2. monitoring Mar 23, 2026, 12:01 AM UTC

    We are now observing high rates of success of VoIP authentication. The issue appears to be resolved but we will continue to monitor the situation.

  3. resolved Mar 23, 2026, 02:23 AM UTC

    VoIP authentication has returned to normal operation with sustained success rates observed.

Read the full incident report →

Critical March 2, 2026

Service Outage on DUO81

Detected by Pingoru
Mar 02, 2026, 08:30 AM UTC
Resolved
Mar 03, 2026, 11:46 PM UTC
Duration
1d 15h
Affected: Core Authentication ServiceAdmin PanelPush DeliveryPhone Call DeliverySMS Message DeliveryCloud PKISSO
Timeline · 9 updates
  1. investigating Mar 02, 2026, 08:30 AM UTC

    We are currently investigating a service degradation on our DUO81 deployment and are working to restore services as soon as possible.

  2. investigating Mar 02, 2026, 08:31 AM UTC

    We are continuing to investigate this issue.

  3. identified Mar 02, 2026, 09:01 AM UTC

    We have isolated the issue to a regional outage and are working with our partners to alleviate the degraded performance.

  4. identified Mar 02, 2026, 09:01 AM UTC

    We are continuing to work on a fix for this issue.

  5. identified Mar 02, 2026, 02:00 PM UTC

    We are continuing to work on a fix for this issue.

  6. identified Mar 02, 2026, 02:44 PM UTC

    Our cloud provider is responding to a power outage at a primary data center that continues to cause elevated error rates and connectivity issues across the region. While early signs of recovery were observed, the provider has since confirmed the impact is ongoing. Full restoration and environment stability are expected to take several hours. We will provide our next update within 6 hours.

  7. identified Mar 02, 2026, 08:27 PM UTC

    We remain in active coordination with our cloud service provider as they work to resolve a power outage affecting a primary data center. Connectivity issues and elevated error rates across the region will persist until power has been fully restored. The provider has indicated that full restoration and environment stabilization may take a day or more.

  8. identified Mar 03, 2026, 07:18 PM UTC

    As previously communicated, a major power and connectivity outage at a third-party data center in the UAE operated by a third-party vendor has impacted Cisco Duo functionality in the region. Our engineering teams have worked continuously to implement local mitigations, but the persistent instability of the regional infrastructure has required more comprehensive measures to ensure business continuity. To fully resolve these issues and restore service stability, Cisco Duo has officially initiated its Disaster Recovery (DR) process. This involves transitioning critical service dependencies and user data away from the affected UAE region to secure, high-availability data centers.

  9. resolved Mar 03, 2026, 11:46 PM UTC

    The service outage affecting DUO81 has been resolved. All impacted customers have been successfully migrated to an alternative Duo deployment. This migration has restored full service functionality for all affected users.

Read the full incident report →

Minor March 1, 2026

Service degradation on DUO81

Detected by Pingoru
Mar 01, 2026, 01:29 PM UTC
Resolved
Mar 01, 2026, 04:39 PM UTC
Duration
3h 9m
Affected: Core Authentication ServiceAdmin PanelPush DeliveryPhone Call DeliverySMS Message DeliveryCloud PKISSO
Timeline · 5 updates
  1. investigating Mar 01, 2026, 01:29 PM UTC

    We are currently investigating a service degradation on our DUO81 deployment and are working to restore services as soon as possible.

  2. identified Mar 01, 2026, 02:13 PM UTC

    We have isolated the issue to a regional outage and are rerouting our traffic to alleviate the degraded performance.

  3. identified Mar 01, 2026, 03:33 PM UTC

    We are continuing to work to reroute traffic in order to alleviate the degraded performance.

  4. monitoring Mar 01, 2026, 04:09 PM UTC

    We have rerouted traffic and are monitoring the behavior for stable, positive results.

  5. resolved Mar 01, 2026, 04:39 PM UTC

    The issue was resolved by rerouting traffic.

Read the full incident report →

Minor February 23, 2026

All Deployments - Entra 504 Gateway Timeouts

Detected by Pingoru
Feb 23, 2026, 03:04 PM UTC
Resolved
Feb 23, 2026, 05:52 PM UTC
Duration
2h 47m
Affected: Core Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication ServiceCore Authentication Service
Timeline · 5 updates
  1. investigating Feb 23, 2026, 03:04 PM UTC

    We are currently investigating an issue where 504 Gateway timeouts are present when accessing Entra when Duo is called for MFA. We are working to resolve as quickly as possible.

  2. investigating Feb 23, 2026, 04:20 PM UTC

    We are continuing to investigate an issue where 504 Gateway timeouts are present when accessing Entra when Duo is called for MFA. We are working with our respective partners to resolve as quickly as possible.

  3. monitoring Feb 23, 2026, 04:38 PM UTC

    We have deployed a fix for the gateway timeouts and are now seeing successful authentications. We are currently monitoring for any further issues.

  4. resolved Feb 23, 2026, 05:52 PM UTC

    The issue causing 504 gateway timeouts during Microsoft Entra logins when Duo MFA was called has been fully resolved. Authentication services are operating normally at this time. We will share a root cause analysis once it becomes available.

  5. postmortem Feb 25, 2026, 03:01 PM UTC

    # Summary On February 23, 2026, US-based users utilizing the Duo integration with Azure Identity management experienced increased authentication failures and timeouts. These errors were occurring specifically when accessing applications using Microsoft Entra and Duo as the MFA provider. Duo engineering was alerted to the issues via monitoring at 9:15 AM and promptly began investigating various factors that could have caused this error to occur, including checking the health of the different third-party services involved. Finally, the root cause was identified to be increased CPU usage resulting from a code change that added additional validation for security operations. The incident was remediated by scaling the backend services that support this integration. During the incident, updates were posted to the status page as new information became available. At the beginning of the incident, the impact of the issue was underestimated, and thus notifications were not set to go out along with these status updates. When the impact assessment changed, notifications should have been set to go out, but this was missed. Processes have been improved to help prevent this from happening in the future. # Timeline of Events | **Time \(in EST\) 2/23/2026** | **Event** | | --- | --- | | 9:15 am | Engineering begins investigating AzureAuth errors | | 9:27 am | Duo begins receiving reports of 504 gateway timeout errors for customers accessing applications using Microsoft Entra and Duo. | | 10:02 am | First status page from Duo is put up regarding investigating the root cause. This status page is posted without notifications due to assumed scale of incident. | | 11:10 am | Duo scales resources for the Azureauth US deployment. | | 11:19 am | Errors begin to subside. | | 11:24 am | The incident is moved to monitoring. | | 11:30 am | The incident is resolved. | # Root Cause\(s\) The Duo team follows a regular and disciplined release process across all services. Changes are routinely deployed to improve functionality, security posture, and overall reliability. All releases undergo comprehensive validation, including: * Unit testing * Integration testing * Frontend testing * Performance testing This layered testing strategy is designed to identify functional defects, regressions, and performance impacts prior to production deployment. In the days leading up to the incident, a software update was deployed to the backend service that supports the Duo integration with Azure Identity management. This update was part of a broader security improvement effort. The change successfully passed all standard validation processes and was not expected to introduce downtime or performance degradation. During the Monday morning traffic peak, this backend service experienced elevated CPU utilization, resulting in service degradation. The following points all contributed to the service interruption: * **Increased CPU Utilization Per Request** * The deployed change approximately doubled CPU consumption per request within this service. * This materially increased overall compute demand during peak traffic. * **Performance Test Coverage Gaps** * Existing performance tests did not identify the increased CPU usage introduced by the change. * The specific workload characteristics that amplified CPU consumption under peak conditions were not fully represented in pre-production testing. * **Monitoring Gaps** * A recent migration of our monitoring services missed CPU monitors for this service, leading to an alerting gap when CPU consumption started trending upward. * Alerts were triggered only after peak load conditions were reached. # Remediation and Future Work To address all the causes for the incident, Duo is committed to doing the following: * **Addressing increased CPU Utilization per Request** * **This backend service has been scaled up \(Completed\)** * Additional resources have been added to the infrastructure powering this backend service to provide additional compute headroom. * This ensures sufficient capacity to absorb higher per-request of CPU costs. * **Connection Efficiency Improvements \(In Progress\)** * Investigate using persistent connection pooling, and/or caching mechanism to reduce connection overhead and lower per-request for CPU consumption. * **Graceful Degradation Enhancements \(In Progress\)** * Improvements being explored to ensure systems degrade gracefully under high CPU load, with the goal of protecting critical authentication flows and reducing user impact during resource saturation events. * **Addressing Performance Testing Coverage Gaps** * **Expanded Performance Test Coverage \(In Progress\)** * Performance testing will be updated to explicitly model this failure scenario. * Peak-load and stress conditions will be more accurately simulated. * **Performance-Based Release Gates \(In Progress\)** * Performance tests will become release-gating criteria. * Changes that materially impact resource consumption will be identified before production deployment. * **Addressing Monitoring Gaps** * **Capacity Monitoring Enhancement \(Completed\)** * Missing capacity monitors \(inadvertently omitted during a recent migration\) have been restored. * Monitoring coverage for this service has been expanded. * **Comprehensive Monitoring Audit \(Completed\)** * Full audit of all capacity monitors underway to ensure complete monitoring coverage and eliminate similar gaps across services. * **Customer Communication Improvements** * **Improved Status Page Notifications** * Status page processes have been updated to ensure faster and clearer communication. * Commitment to timely, transparent, and regular updates to all customers during future incidents, with notifications.

Read the full incident report →

Minor February 23, 2026

[US Deployments]: Duo Phone Call Authentication Failures for US Region

Detected by Pingoru
Feb 23, 2026, 02:02 PM UTC
Resolved
Feb 23, 2026, 06:20 PM UTC
Duration
4h 17m
Affected: Phone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call DeliveryPhone Call Delivery
Timeline · 3 updates
  1. investigating Feb 23, 2026, 02:02 PM UTC

    We are currently investigating an issue causing an abnormal phone call authentication success rate for the US region. Please check back here or subscribe to updates for any changes.

  2. monitoring Feb 23, 2026, 05:26 PM UTC

    The issue causing an abnormal phone call authentication success rate is tied to a third-party carrier. We are monitoring the third-party's communications at this time and can confirm that Duo telephony services are functioning as expected at this time.

  3. resolved Feb 23, 2026, 06:20 PM UTC

    The issue causing an abnormal phone call authentication success rate has been resolved by the third-party carrier.

Read the full incident report →

Minor February 19, 2026

[Multiple Deployments] AI Assistant not available in India

Detected by Pingoru
Feb 19, 2026, 02:46 PM UTC
Resolved
Feb 19, 2026, 06:01 PM UTC
Duration
3h 15m
Affected: AI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI Assistant
Timeline · 3 updates
  1. investigating Feb 19, 2026, 02:46 PM UTC

    We are investigating an issue causing the AI Assistant to be unavailable for administrators in India. Please check back here or subscribe to updates for any changes.

  2. monitoring Feb 19, 2026, 05:47 PM UTC

    We have deployed a fix for the issue causing the AI Assistant to be unavailable for administrators in India and are monitoring the results of the fix at this time.

  3. resolved Feb 19, 2026, 06:01 PM UTC

    The issue causing the AI Assistant to be unavailable for administrators in India has been resolved.

Read the full incident report →

Minor February 19, 2026

[All Deployments] AI Assistant Outage for new users

Detected by Pingoru
Feb 19, 2026, 02:35 PM UTC
Resolved
Feb 19, 2026, 10:32 PM UTC
Duration
7h 56m
Affected: AI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI AssistantAI Assistant
Timeline · 4 updates
  1. investigating Feb 19, 2026, 02:35 PM UTC

    We are investigating an issue causing failures when administrators attempt to access the AI Assistant for the first time. Any administrators who have used the Assistant before should still be able to at this time. Please check back here or subscribe to updates for any changes.

  2. identified Feb 19, 2026, 05:47 PM UTC

    We have identified the issue causing failures when administrators attempt to access the AI Assistant for the first time and are working to deploy a fix at this time.

  3. monitoring Feb 19, 2026, 09:30 PM UTC

    We are currently monitoring the results of a deployed fix for the issue causing failures when administrators attempt to access the AI assistance for the first time.

  4. resolved Feb 19, 2026, 10:32 PM UTC

    The deployed fix for this incident has resolved the issue. We will continue to monitor these results.

Read the full incident report →

Notice February 4, 2026

All Deployments: Duo Enrollment URL Session Expired Errors

Detected by Pingoru
Feb 04, 2026, 06:55 PM UTC
Resolved
Feb 05, 2026, 01:11 AM UTC
Duration
6h 16m
Affected: Admin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin PanelAdmin Panel
Timeline · 4 updates
  1. identified Feb 04, 2026, 06:55 PM UTC

    We have Identified the cause of enrollment failures that display the error message "Your session has expired. Please try again." and are working to correct the issue as soon as possible. As a workaround: -If using enrollment email links, update the enrollment experience settings (https://duo.com/docs/administration-settings#enrollment) to show New Universal Prompt. -If enrolling using in-line self enrollment with an existing application (https://duo.com/docs/enrolling-users#inline-self-enrollment), update that application to use the Universal Prompt (https://duo.com/docs/universal-prompt-update-guide). -You can also enroll users manually from the Duo Admin Panel (https://duo.com/docs/administration-devices#adding-a-2fa-device-to-a-user) or issue an enrollment code for self-enrollment (https://duo.com/docs/enrolling-users#generate-enrollment-codes-for-existing-users). Please check back here or subscribe to updates for any changes.

  2. monitoring Feb 05, 2026, 12:56 AM UTC

    We have implemented a fix for the enrollment failures that caused the error message "Your session has expired. Please try again." and are monitoring the results closely.

  3. resolved Feb 05, 2026, 01:11 AM UTC

    The issue causing enrollment failures that display the error message "Your session has expired. Please try again." has been resolved.

  4. postmortem Feb 10, 2026, 09:18 PM UTC

    # **Enrollment Timeout Outage** Incident Report – 02/04/2026 ## Summary A recent software update Duo made related to certificate security improvements inadvertently changed the order of operations for user sessions in our legacy enrollment experience. This resulted in user sessions not being properly initialized, prompting the system to mistakenly identify these sessions as expired. Affected users were unable to complete enrollment and saw the message: “Your session has expired. Please try again.” The issue only affected enrollment flows using the legacy Traditional Prompt. Customers were able to successfully enroll by switching to the Universal Prompt enrollment experience as a workaround. Duo identified and corrected the issue by ensuring sessions are fully initialized before they are used. The fix was deployed on 2026-02-04, and enrollment is now functioning normally. Duo has implemented additional safeguards to prevent similar session handling issues in future updates. ## Timeline of Events **Date/Time \(in EST\)** 02/04/2026 03:57AM - Duo receives reports that customers are unable to complete enrollments 02/04/2026 09:00 AM - Authentication team starts investigating 02/04/2026 10:42 AM - Authentication team identifies root cause 02/04/2026 3:40 PM - The fix begins rolling out to customers 02/04/2026 7:26 PM - The fix finishes rolling out to customers 02/04/2026 7:26 PM - Duo confirms that enrollments are working as intended

Read the full incident report →

Looking to track Duo Security downtime and outages?

Pingoru polls Duo Security's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Duo Security reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Duo Security alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Duo Security for free

5 free monitors · No credit card required