Duo Security, now part of Cisco, offers multi-factor authentication, boosting digital security by verifying identities and preventing unauthorized access.
.png)
Bluetooth Duo Push is an enhanced authentication method that uses Bluetooth technology to confirm a user’s phone is physically near their computer during login. It builds on the familiar Duo Push experience and adds a layer of security behind the scenes without adding friction for the user.

As phishing attacks become more advanced, organizations need stronger protection during login but many cannot afford or manage hardware-based security keys. Existing backup methods like entering a code manually leave room for human error and potential remote attacks.
Bluetooth Duo Push verifies proximity automatically using Bluetooth and blocks login attempts when the phone is not nearby. It removes the need for backup code entry and keeps the experience simple with just one tap to log in. This approach provides strong phishing-resistant security without the cost or complexity of hardware tokens.

To start off this project, we examined the internal processes, explored the product, and evaluated its existing state.
Duo Security’s release cycle moves from Private Preview for early technical validation, to Public Preview for usability and feedback, and finally to General Availability for full market release. The phased release approach at Duo Security made the design process iterative. We started with the smallest scope and gradually expanded, allowing the designs to evolve in each stage based on feedback and real-world usage.
Out of 29 different personas, we focus on 3 key personas for this project and analyze which parts of the product each one uses.

Duo offers multiple Push authentication options—standard Duo Push and Verified Duo Push (which requires users to enter a code shown on screen)—each providing different levels of phishing resistance and user interaction.

A two-factor authentication method where users receive a push notification on their mobile device upon login. They can approve or deny the request with a single tap, providing a quick and secure way to verify their identity.
Security properties:

Enhances Duo Push by requiring users to enter a verification code displayed on their login screen into the Duo Mobile app. This additional step mitigates push fatigue and accidental approvals.
Security properties:
The current state shown here reflects how admins can configure Duo Mobile settings to allow either standard Duo Push or Verified Duo Push.

We kept the initial rollout lightweight to test core Bluetooth functionality and start gathering feedback on how customers use and respond to the feature.
The existing Verified Duo Push experience was enhanced by adding a Bluetooth-based proximity check, accompanied by a visual spinner that indicates the system is verifying nearby devices. Checking for device proximity through Bluetooth adds an extra layer of security while enhancing the overall user experience by making authentication smoother and more seamless, helping increase our Verified Push adoption rates while maintaining stronger security than regular Duo Push.


The settings configuration allows admins to enable Verified Duo Push, with a nested checkbox option to autofill the code using Bluetooth after a successful proximity check, giving control over both security and user experience.


"It was seamless. It was nice, instead of entering the numbers manually. So far I would say it's more convenient, and I am liking it."
"We would roll this out to everyone. I see it as a security benefit."
We took the next step by introducing a stricter, phishing-resistant authentication option to raise the security baseline and learn how customers respond to more advanced protection methods.
Proximity Verification builds on the same Bluetooth-based proximity check used in Verified Duo Push, but takes a stricter and more phishing-resistant approach. The user still sees the standard Duo Push screen, but the 6-digit code is hidden in the background. There is no option to type the code, so authentication can only complete if the devices are physically near each other. This adds stronger security while keeping the user experience familiar and seamless.



The settings for Verified Duo Push now include three radio buttons, giving admins control over the level of authentication security. Each option increases security as you move down the list.

Lee’s user experience looks like a standard Duo Push screen, not a typical Verified Push, yet it’s configured under Verified Push settings. This could cause confusion since the visual doesn’t match the setting label.

The initial phases went smoothly and successfully, with no major changes needed and a focus on ongoing refinement.
We reviewed all cases where Bluetooth might be unavailable and defined how users should recover versus when access is blocked. This included addressing platform support issues and adding prompt screens to guide users toward alternative actions.

From earlier phases, it was clear that IT administrators need detailed authentication logs showing which push requests were approved via Bluetooth versus other methods. We enhanced filtering options to align with the settings configuration and added clear indicators in the logs to highlight Bluetooth usage.

Proximity Verification can block users from moving forward, unlike Bluetooth Autofill, so we made small adjustments to existing prompt screens to offer alternative authentication methods. We also added Bluetooth indicators to illustrations and updated content on both device prompts and the Duo Mobile app to enhance clarity.

The Verified Duo Push with Bluetooth Autofill and Proximity Verification features became generally available in June 2025.

We presented our Verified Duo Push features with Bluetooth Autofill and Proximity Verification at the Identiverse conference, where they drew significant interest from attendees.
"This was the thing that we got the most interest from customers at our Identiverse booth"

"It's also awesome to be able to chat about this with a group of technical sellers who ask a ton of hard questions and to have absolutely no concerns about explaining what it is, how it's secure, how it compares to other FIDO2 solutions."
We’re continuing to build on this work as proximity-based authentication becomes a core part of Duo’s long-term strategy.
This section highlights what went well, where there was room to improve, and key takeaways from working on a complex, cross-platform authentication experience. It captures both the collaborative wins and the lessons that shaped my growth as a product designer.