- Go to the Identity > Settings page in the Console and create a user directory. (See Add User Directory) 
- Copy the enrollment token to the clipboard. 
- Continue with instructions for Entra ID/Google Workspace just below, or LDAP/Okta. 
 Note: After setting the parameters, select Enable to enable (means the connector will start on boot-up) or Start to start (will not start automatically on boot-up) the connector.
For Microsoft Entra ID and Google Workspace:
- Select Services > Connector > Configure > Authorize. 
- Enter the enrollment token. 
- See Entra ID or Google Workspace below to continue. 
 For Microsoft Entra ID:
 You will see something like this example output: (note that the token/code is always unique)
>>> /services/connector/configure Select option: Authorize ? Enter enrollment token: http://enterprise.barracuda.com/……
2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...
Please authorize this connector to access your Entra ID directory information
                     To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the
code CTLF7GLW2 to authenticate. (Note that this is a sample code)
After providing the code in a browser, you should see a message like this in the backend:
Authorization was successful 2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector
Finally, check the Settings page to make sure the sync was successful.
For Google Workspace:
You will see something like this example output: (note that the token/code is always unique)
>>> /services/connector/configure Select option: Authorize
? Enter enrollment token: http://enterprise.barracuda.com/……
2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...
Copy and paste the authorization code. It should return "Authorized successfully".
2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector
Finally, check the Settings page to make sure the sync was successful.
       For LDAP and Okta:
- Select Services > Connector > Configure > Set. 
- Set up your required parameters for authentication, including the enrollment_token. Here are the parameters to set for LDAP: 
 FYDE_LOGLEVEL: debug
 FYDE_LDAP_HOST: 10.x.x.x
 FYDE_LDAP_PROFILE: ad
 FYDE_LDAP_USER_SEARCH_BASE: dc=cga,dc=com
 FYDE_LDAP_GROUP_SEARCH_BASE: dc=cga,dc=com
 FYDE_LDAP_AUTH_METHOD: simple
 FYDE_LDAP_AUTH_USERNAME:  administrator@cga.com 
 FYDE_LDAP_AUTH_PASSWORD:  
 FYDE_LDAP_USE_STARTTLS: sync  
Here are the parameters to set for OKTA. Log into Okta and create the token under Security > API > Tokens.
FYDE_OKTA_AUTH_TOKEN: 'zzz'
FYDE_OKTA_DOMAINNAME: 'mydomain.okta.com'
