It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure Allowed VPN User Groups

  • Last updated on

Barracuda SecureEdge allows you to restrict access to the Point-to-Site feature based on users and groups. 

Before You Begin

Step 1. Group Claims in Microsoft Azure 

  1. Log into the Azure portal: https://portal.azure.com
  2. In the left menu, click All services and search for Microsoft Entra ID.
  3. Click Microsoft Entra ID.
  4. In the left menu of the Microsoft Entra ID blade, click Enterprise applications.
    enterprise_application.png
  5. In the Enterprise applications blade, click All applications.
  6. Click on the application you created, e.g., Campus-SAML-Endpoint.
  7. Click Single sign-on
  8. The Set up Single Sign-On with SAML blade opens.
  9. In the User Attributes & Claims section, click Edit.
    edit_user_claim.png
  10. The User Attribute and Claims blade opens.
  11. Click Add a group claim.
    add_group_claim.png
  12. The Group claim blade opens. Specify values for the following:
    • Which groups associated with the user should be returned in the claim? Select Security groups.
    • Source attribute – Select Group ID.
      group_claim.png
  13. Click Save.

Step 2. Configuration in Barracuda SecureEdge 

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.

  2. Go to Infrastructure > Settings.
    inf_set.png
  3. The Settings configuration window opens.
  4. Scroll down to the MICROSOFT ENTRA ID INTEGRATION section.
  5. In the Allowed VPN User Group, type to search for users or groups you want to grant permission to use Personal Access. Only users and groups added here are allowed to use Personal Access. 
    ms_entraID.png
  6. Click Save.

Further Information

  • For more information on Personal Access and Site Authentication, see Point-to-Site.