It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure OpenID Connect

  • Last updated on

The Barracuda SecureEdge Manager allows administrators to configure and authenticate OpenID Connect for the workspace. The OpenID Connect protocol ( OIDC) is an identity authentication protocol and can be used to enable two unrelated applications to share user profile information without compromising user credentials.

openid-01.png

Configure OpenID Connect

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.

  2. In the left menu, click the Tenants/Workspaces icon and select the workspace you want to configure OpenID Connect as an identity provider for.

  3. In the left menu, click Identity > Settings.

    goto-id-settings.png

  4. The Settings page opens. In the Identity Providers section, click Add Identity Provider.

    click-add-id-prov.png

  5. From the drop-down menu, select OpenID Connect.

    sel-openid.png

  6. The Add Identity Provider page opens. Specify the values for the following:

    • Display Name – Enter display name.

    • Discovery URL – Enter the discovery URL. Note: In this case we are using Google OpenID Connect.

    • Client ID – Enter the client ID.

    • Client Secret – Enter the client secret.

    • Scope – Enter the scope.

      openid-02.png

  7. Click Save.

  8. Authenticate with your identity provider. Provide your admin OpenID Connect credentials and click Sign in.

  9. In the Identity Providers table, you can see that the identity provider OpenID Connect has been added and that under the fieldname STATUS the text now states Active with a green check mark.

    openid-03.png

     

Edit OpenID Connect

To edit the OpenID Connect identity provider settings:

  1. In the left menu, click the Tenants/Workspaces icon and select the workspace you want to edit the OpenID Connect identity provider for.

  2. Go to Identity > Settings.

  3. The Settings page opens. In the Identity Providers section, you can see that OpenID Connect is displayed as your identity provider.

  4. To edit your OpenID Connect settings, click on the pencil icon.

    openid-04.png

  5. The Edit Identity Provider page opens. Edit the value you are interested in. For example, you can edit values for Display Name, Discovery URL, Client Secret, and Scope. Note: You cannot change the value for Client ID because the option Client ID is disabled.

    openid-06-edit.png

  6. Click Save.

Remove OpenID Connect

  1. Go to Identity > Settings. The Settings page opens.

  2. In the Identity Providers section, you can see your OpenID Connect configuration is displayed.

  3. To remove the OpenID Connect configuration, click on the trash can icon.

    openid-05.png

  4. The Remove Identity Provider page opens.

    rm-id-provider.png

     

  5. Click OK to confirm.

(Optional) Test OpenID Connect

If you must test OpenID Connect quickly, proceed with the following steps:

  1. On the Settings page in the Identity Providers section, click the icon of three vertical dots to test the identity provider.

    openid-07.png

  2. Click Test Identity Provider.  

  3. To authenticate your identity provider, follow the authentication instructions on screen.

  4. To log in with Google admin credentials, a new browser tab opens. Enter your password and click Sign In.

  5. After logging into your account, you receive the confirmation message that the authentication was successful. You can also see verification values for fieldnames such as nickname, name, email, email verified, and iss.

    authentication.png

The Test Identity Provider feature for OpenID Connect can be successfully completed and verified with any user directory, or even with no user directory, configured for your workspace.

Next Steps