We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Cloud Control

Azure MFA Requirements for Microsoft CSPs

  • Last updated on

Starting August 1, 2019, all Microsoft Cloud Solution Providers must use multi-factor authentication for all users, including service accounts, in their partner tenant.

For more information, see Partner Security Requirements.

Required use of multi-factor authentication impacts all Barracuda partners who are also Microsoft CSPs and who configure Azure AD in Barracuda Cloud Control. Barracuda Cloud Control does not yet support the use of Azure MFA, which causes login failures if Azure MFA is enabled or required. As a workaround, configure a conditional access policy in Azure AD to bypass the multi-factor authentication for users signing in from trusted IPs.

To configure a conditional access policy and enable trusted IPs, refer to the section on Trusted IPs in the Microsoft support article Configure Azure Multi-Factor Authentication settings.

The following Barracuda IP addresses must be used to create the conditional access policy:

  • 35.170.131.81
  • 54.156.244.63
  • 54.209.169.44
Last updated on