It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen WAN

How to Configure Allowed VPN User Groups

  • Last updated on

Barracuda CloudGen WAN allows you to restrict access to the Personal Access based on users and groups. 

Before You Begin

Step 1. Group Claims in Microsoft Azure 

  1. Log into the Azure portal: https://portal.azure.com
  2. In the left menu, click All services and search for Azure Active Directory.
  3. Click Azure Active Directory.
  4. In the left menu of the Azure Active Directory blade, click Enterprise applications.
    ent_app.png
  5. In the  Enterprise applications  blade, click All applications.
  6. Click on the application you created, e.g., Campus-SAML-Endpoint.
  7. Click Single sign-on
  8. The Set up Single Sign-On with SAML blade opens.
  9. In the User Attributes & Claims section, click Edit.
    edit_user_claim.png
  10. The User Attribute and Claims blade opens.
  11. Click Add a group claim.
    add_group_claim.png
  12. The Group claim blade opens. Specify values for the following:
    • Which groups associated with the user should be returned in the claim? -   Select Security groups.
    • Source attribute - Select Group ID.
      group_claim.png
  13. Click Save.

Step 2. Configuration in Barracuda CloudGen WAN 

  1. Go to https://cloudgenwan.barracudanetworks.com/  and log in with your existing Barracuda Cloud Control account.
  2. Click PERSONAL ACCESS.
    personal_access.png
  3. The Personal Access window opens.
  4. Go to the AZURE AD INTEGRATION section. 
    • Allowed VPN User Group - Type to search for users or groups you want to grant permission to use Personal Access. Only users and groups added here are allowed to use Personal Access.
      allowed_vpn.png
  5. Click Save.

Further Information

Last updated on