On the Barracuda SSL VPN, you can use an external Active Directory server for a user database. If you are using multiple user databases, on the Barracuda SSL VPN 380 or above, each user database manages its own authentication server configuration, so you can configure multiple Active Directory servers on the same unit. If you are using a Barracuda SSL VPN 180 or 280 you must edit the default user database to configure the Active Directory server.
Before you begin
Before you begin, verify that your Barracuda SSL VPN can reach your Microsoft Active Directory server. If you deployed your Barracuda SSL VPN in a DMZ, open the necessary ports for read or read/write access to your Active Directory server.
You also need the following information:
- Domain controller hostname
- Domain
- Service account name
- Service account password
Configure the user database to use an Active Directory server
In the user database, provide the information required to connect with the Active Directory server.
- Go to the ACCESS CONTROL > User Databases page.
- In the Create User Database section, click the Active Directory tab.
- In the Connection section, enter the following information:
- Domain Controller Hostname – The name of the domain controller.
- Domain – The domain.
- Service Account Name – The user with permissions for read or read/write access to the Active Directory server. Write permissions must be configured in the Advanced Settings.
- Service Account Password – The password for the user.
- (Optional) Click Show Advanced Settings to configure Backup Domain Controller, SSL, read/write access, and OU Filters.
- Click Add.
After you add the user database, it appears in the User Databases section on the bottom of the page.