It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Load Balancer ADC

How to Configure Access Control (AAA)

  • Last updated on
Required Product Model and Version
This article applies to the Barracuda Load Balancer ADC 540 and above, version 5.1 and above, and to all Barracuda Load Balancer ADC models in version 5.2 and above.

After you integrate an external authentication server, you can associate it with a service to authenticate end users of a web application. LDAP, RADIUS, and Kerberos authentication protocols are supported.

You can create authorization policies to allow or deny requests from authenticated users. In the policies, specify the URL, host, and other expressions which match the requests to be handled, as well as a list of allowed and restricted users.

General Steps on Configuring Access Control

If instructions on configuring access control specifically for your application are not available, follow the instructions in this section.

Before You Begin

Create an authentication service for the LDAP, RADIUS, or Kerberos authentication server that you want to integrate with the Barracuda Load Balancer ADC.

For instructions, see How to Integrate an External Authentication Server.

Step 1. Assign the Authentication Service to a Web Service

Assign the authentication service to the service for your website.

  1. Go to the ACCESS CONTROL > Authentication page.
  2. Next to the service, click Edit
  3. In the Edit Authentication Policy section:
    1. Set the Status to On.
    2. From the Authentication Service list, select the alias of the server for authenticating users of the service.

      Password Reset Page for LDAP

      When LDAP is selected as an authentication database server, the Auth Password Expired URL field is displayed. In this field, specify the URL where users are redirected if their authentication fails because their passwords expired. Users are redirected to reset their passwords. This feature only is supported when the authentication database is Microsoft Active Directory-LDAP. The expired password on the OpenLDAP server is not detected by the Barracuda Load Balancer ADC.

    3. (Optional) Dual Authentication Required - Set to Yes to apply a dual authentication policy (requiring two separate authentication services where the primary authentication service should be LDAP and the secondary should be RADIUS) to authenticate the user. If you set this to Yes, you will also need to specify a RADIUS service as the Secondary Authentication Service (this list includes all of the RADIUS authentication services configured on the ACCESS CONTROL > Authentication Services page).

      This option is available only when the LDAP authentication service is selected as the primary authentication service.

    4. (Optional) Enable Bruteforce Prevention - Set to Yes to prevent unauthorized users from making repeated attempts to guess a password. If you enable Bruteforce Prevention, you can also configure the following options:
      • Count Window - The time (in seconds) for allowing the maximum number of requests as specified using the Max Failed Attempts Allowed Per IP option.
      • Max Failed Attempts Allowed Per IP - The maximum number of attempts allowed to enter a password from the client tied to an IP address.
    5. Specify the remaining settings.

      If you are assigning a Kerberos authentication service, ensure that you enter the Kerberos SPN.
  4. Click Save.

In the Authentication Policies section, the name of the authentication service is displayed in the row for the service.

Step 2. Configure an Authorization Policy for the Service

Configure an authorization policy to control the access of authenticated users to your website. You can configure access by user, group or by both. In the policy, specify the URL, host, and extended match patterns for requests that must be handled by the policy.

  1. Go to the ACCESS CONTROL > Authorization page. 
  2. In the Add Authorization Policy section:
    1. From the Service list, select the service that you are configuring the authorization policy for.
    2. Enter a name for the policy.
    3. Set the Status to On.

      When you set the status to On, a user accessing the URL has to authenticate. When you set the status to Off, the URL is exempt from the authorization policy. By default, a policy for /nclogin.submit is created and set to Off, because you cannot request authentication from the login page.

    4. Specify the URL, host, and other expressions that must match requests.
    5. Specify the Login Method. If you want to create a custom login or challenge page, select HTML Form.

      If you are using a custom challenge page, it does not support the HTTP Basic Authentication login method.

  3. Click Add. The authorization policy appears in the Existing Authorization Policies section.
  4. Next to the policy, click Edit.
  5. In the Edit Authorization Policy window, specify if you want to allow or deny the request to all authenticated users or only to specific users and groups.  

  6. Click Save .

Application-Specific Instructions for Configuring Access Control

Complete the instructions for your application on how to configure access control:

 

Step 1. Configure Kerberos Authentication on the Barracuda Load Balancer ADC

Ensure that you have already configured the Kerberos Authentication service. For instructions, see How to Integrate an External Authentication Server.

Step 2. Configure your SharePoint Servers 

  1. Navigate to your SharePoint Web Admin Site > Web Applications > Authentication Providers.

  2. Select the Enable Windows Authentication check box.

  3. Select the Integrated Windows authentication check box and then select Negotiate (Kerberos).

    Screen Shot 2014-09-05 at 1.44.22 PM.png 

Step 3. Assign Kerberos Authentication Service to the SharePoint Service

  1. Go to the ACCESS CONTROL > Authentication page.

  2. Next to the service, click Edit

  3. In the Edit Authentication Policy section:

    1. Set the Status to On.
    2. From the Authentication Service list, select the alias of the Kerberos service you created in Step 1.

  4. Click Save.

Step 4. Configure an Authorization Policy for the SharePoint Service

Configure an authorization policy to control the access of authenticated users to your SharePoint Application. You can configure access by user, group, or both user and group. In the policy, specify the URL, host, and extended match patterns for requests that must be handled by the policy.

  1. Go to the ACCESS CONTROL > Authorization page. 

  2. In the Add Authorization Policy section, click Add. The authorization policy appears in the Existing Authorization Policies section.

    1. From the Service list, select the SharePoint service.
    2. Enter a name for the policy.
    3. Set the Status to On.
    4. Specify the URL, host, and other expressions that must match requests.
    5. Specify the Login Method. If you want to create a custom login or challenge page, select HTML Form.

  3. Next to the policy, click Edit.

  4. In the Edit Authorization Policy window, specify if you want to allow or deny the request to all authenticated users or only to specific users and groups.

  5. Set Send Basic Authentication to On.

  6. Click Save.

Step 5. Verify your Setup

  1. Navigate to your SharePoint site via the FQDN of your VIP address. 

  2. After the Barracuda Load Balancer ADC authentication page loads, enter the user credentials of a user account that has access to the SharePoint Application.

Step 1. Configure LDAP Authentication on the Barracuda Load Balancer ADC

Ensure that you have already configured the LDAP authentication service. For instructions, see How to Integrate an External Authentication Server.

Step 2. Configure your Exchange 2013 Servers

  1. Navigate to the Exchange Control Panel at https://<fqdn of CAS>/ecp.

  2. Click Servers > Virtual Directories.

    exchkerb1.png

  3. Click the first OWA page for one of the servers and click the edit icon.

    ldapexch4.PNG

  4. Click authentication

  5. Click Use one or more standard authentication methods, and then select the Integrated Windows Authentication and Basic Authentication check boxes.

  6. Repeat steps 1 to 5 for the other OWA site on the other CAS as well as the ECP pages on your other CAS. 

  7. Go back to SERVERS > SERVERS, and edit one of the CAS.

  8. Click Outlook Anywhere.

    ldapexch3.PNG

     

  9. Verify the internal and external host name settings and then click Allow SSL Offloading

  10. Repeat for the other CAS.

  11. Next, open the Exchange Management Shell on your CAS and run the following commands.
    Get-OutlookAnywhere -Server <ServerName> -ADPropertiesOnly | Set-OutlookAnywhere -InternalClientAuthenticationMethod Basic -IISAuthenticationMethods Basic, Ntlm
     

    ldapexch1.PNG

  12. Reset the IIS to ensure that the changes are applied.

    ldapexch2.PNG

Step 3. Assign LDAP Authentication Service to the Exchange 2013 Service

  1. Go to the ACCESS CONTROL > Authentication page.

  2. Next to the service, click Edit

  3. In the Edit Authentication Policy section, click Save.

    1. Set the Status to On.
    2. From the Authentication Service list, select the alias of the LDAP service you created in Step 1.

    3. (Optional) S pecify the URL where users are redirected if their authentication fails because their passwords expired in the Auth Password Expired URL. Users are redirected to reset their passwords. 

Step 4. Configure an Authorization Policy for the Exchange 2013 Service

Configure an authorization policy to control the access of authenticated users to your Exchange OWA. You can configure access by user and/or group. In the policy, specify the URL, host, and extended match patterns for requests that must be handled by the policy.

  1. Go to the ACCESS CONTROL > Authorization page. 

  2. In the Add Authorization Policy section:Click Add. The authorization policy appears in the Existing Authorization Policies section.

    1. From the Service list, select the Exchange 2013 service.
    2. Enter a name for the policy.
    3. Set the Status to On.
    4. Specify the URL, host, and other expressions that must match requests.

      If you specify "/* " as the URL match, add the following Authorization Policies with the specified URL match and set the Status to Off:

      • /Microsoft-Server-ActiveSync*
      • /rpc/rpcproxy.dll
      • /autodiscover/autodiscover.xml 

      As an alternative to setting /* as the URL match and adding the other "Off" policies, you can specify policies for individual pages you want users to authenicate on before accessing the server, such as the OWA (Outlook Web Access) or ECP (Exchange Control Panel) pages.

      You can create the following Authorization Policies with the Status set to On:

      • /owa*
      • /ecp*
    5. Specify the Login Method. If you want to create a custom login or challenge page, select HTML Form.

  3. Next to the policy, click Edit.

  4. In the Edit Authorization Policy window, specify if you want to allow or deny the request to all authenticated users or only to specific users and groups.

    1. Set Send Basic Authentication to On.

  5. Click Save .

  Step 5. Verify your Setup

  1. Go to: https://<FQDN of your Exchange 2013 VIP Address>/owa

  2. After the Barracuda Load Balancer ADC authentication page loads, enter the user credentials of a user account that has access to OWA. 

Step 1. Configure LDAP or Kerberos Authentication on the Barracuda Load Balancer ADC

Ensure that you have already configured the LDAP or Kerberos authentication service. For instructions, see How to Integrate an External Authentication Server.

Step 2. Configure your Exchange 2010 Servers

  1. Open the Internet Information Services (IIS) Manager.
  2. In the left pane, find and select the site that you are modifying.
  3. In Features View for the selected site, double-click Authentication.
    2010_ldap01.png
  4. On the Authentications page, select Windows Authentication.
  5. In the Actions pane, click Enable to use Windows authentication. The status for Windows Authentication then changes to Enabled.
    2010_ldap02.png
  6. Open the Exchange Management Console.
    2010_ldap03.png
  7. In the console tree, locate the virtual directory that you want to use Integrated Windows authentication.
  8. Select Server Configuration and then select Client Access.
  9. For each server hosting the Outlook Web App virtual directory:
    1. Select the server and click the Outlook Web App tab.
      2010_ldap04.png
    2. In the work pane, select the virtual directory that you want to configure to use Integrated Windows authentication, and click Properties in the Actions pane.
    3. In the Properties window, click the Authentication tab.
    4. Click Use one or more standard authentication methods, and select the Integrated Windows authentication check box.
      2010_ldap05.png
  10. Click OK.
  11. Restart the IIS for each server that you configured to use integrated Windows authentication.

Step 3. Assign LDAP Authentication Service to the Exchange 2010 Service

  1. Go to the ACCESS CONTROL > Authentication page.

  2. Next to the service, click Edit

  3. In the Edit Authentication Policy section, click Save.

    1. Set the Status to On.
    2. From the Authentication Service list, select the alias of the LDAP service you created in Step 1.

    3. (Optional) Specify the URL where users are redirected if their authentication fails because their passwords expired in the Auth Password Expired URL. Users are redirected to reset their passwords. 

Step 4. Configure an Authorization Policy for the Exchange 2010 Service

Configure an authorization policy to control the access of authenticated users to your Exchange OWA. You can configure access by user, group, or both user and group. In the policy, specify the URL, host, and extended match patterns for requests that must be handled by the policy.

  1. Go to the ACCESS CONTROL > Authorization page. 

  2. In the Add Authorization Policy section, click Add. The authorization policy appears in the Existing Authorization Policies section.

    1. From the Service list, select the Exchange 2010 Service
    2. Enter a name for the policy.
    3. Set the Status to On.
    4. Specify the URL, host, and other expressions that must match requests.
    5. Specify the Login Method. If you want to create a custom login or challenge page, select HTML Form.

  3. Next to the policy, click Edit.

  4. In the Edit Authorization Policy window, specify if you want to allow or deny the request to all authenticated users or only to specific users and groups.

  5. Click Save.

Step 5. Verify Your Setup

  1. Go to: https://<FQDN of your Exchange 2010 VIP Address>/owa

  2. After the Barracuda Load Balancer ADC authentication page loads, enter the user credentials of a user account that has access to OWA.

  1. In the IIS Manager, click Application Pools in the left pane. All running applications then appear in the right pane.
    IIS_Manager_App_Pools.jpg
  2. Identify the application to associate with the user. Right-click the application, and select Advanced Settings.
  3. In the Advanced Settings window, click the button next to Identity.
    Advanced_settings.jpg
  4. In the Application Pool Identity window, select Custom account and click Set
  5. Enter the username and password for the user that you created in Active Directory, and click OK.
    App_Pool_Identity.jpg
  6. In the IIS server's Applicationhost.config file, set useAppPoolCredential to true. The file is located at:
    /windows/system32/inetsrv/config/Applicationhost.config

    For example:

    <location path="Default Web Site"> 
    <system.webServer> 
    <security> 
    <authentication> 
    <anonymousAuthentication enabled="false" /> 
    <windowsAuthentication enabled="true" useKernelMode="true" useAppPoolCredentials="true"> 
    <extendedProtection tokenChecking="None" /> 
    </windowsAuthentication> 
    </authentication> 
    </security> 
    </system.webServer> 
    </location>

Step 1. Configure LDAP Authentication on the Barracuda Load Balancer ADC

  1. Go to the ACCESS CONTROL > Authentication Services page, and click the LDAP tab.
  2. In the settings, specify the following:
    • Alias for the IBM Domino LDAP server
    • IP address and port of the server
    • Base DN: O= <Organization Name>
    • Administrator account credentials for Bind DN (Username) and Bind Password
    • Login Attribute: uid
  3. Click Test LDAP to verify that a connection can be established with the LDAP server. The test results display at the bottom of the page. If the test fails, re-enter and re-test the LDAP settings.
  4. Click LDAP Discovery to verify that users can be found with the attributes and filters that you entered. If you want to view detailed query results, select the Verbose check box. In the test results:
    • A green dot means the information has been verified
    • A red dot means the information needs to be corrected

      Although a red dot is displayed next to Base DN, it can be ignored. Click Add.

  5. If any information is incorrect or missing, edit the field and click LDAP Discovery.
  6. After your settings have been validated, click Add

The LDAP service appears in the Existing Authentication Services section.

Step 2. Configure your IBM Domino Servers 

Ensure that HTTP basic authentication is enabled on your IBM Domino servers. For higher security, enable SSL on your servers so that your authentication information is not sent in clear text.

Authentication and access control with the Barracuda Load Balancer ADC does not work with IBM Domino's form-based single sign on redirection.

Step 3. Assign LDAP Authentication Service to the IBM Domino Service

  1. Go to the ACCESS CONTROL > Authentication page.

  2. Next to the service, click Edit

  3. In the Edit Authentication Policy section, click Save.

    1. Set the Status to On.
    2. From the Authentication Service list, select the alias for the LDAP service that you created in Step 1.

Step 4. Configure an Authorization Policy for the IBM Domino Service

Configure an authorization policy to control the access of authenticated users to your IBM Domino iNotes site. You can configure access by user, group, or both the user and group. In the policy, specify the URL, host, and extended match patterns for requests that must be handled by the policy.

  1. Go to the ACCESS CONTROL > Authorization page. 

  2. In the Add Authorization Policy section, click Add. The authorization policy appears in the Existing Authorization Policies section.

    1. From the Service list, select the IBM Domino service.
    2. Enter a name for the policy.
    3. Set the Status to On.
    4. Specify the URL, host, and other expressions that must match requests.
    5. Specify the Login Method. If you want to create a custom login or challenge page, select HTML Form.

  3. Next to the policy, click Edit.

  4. In the Edit Authorization Policy window, specify if you want to allow or deny the request to all authenticated users or only to specific users and groups.

  5. Set Send Basic Authentication to On.

  6. Click Save.

Step 5. Verify your Setup

  1. Go to: https://<FQDN of your IBM Domino VIP Address>/webadmin

  2. After the Barracuda Load Balancer ADC authentication page loads, enter the user credentials of a user account that has access to web admin site.

Additional Authentication Options

If you also want to configure single-sign on or set up a custom login page, see these articles:

For RADIUS servers, you can also configure the SMS PASSCODE for two-factor client authentication with passcodes that are sent to users' mobile phones. See How to Configure SMS Passcode Authentication Service.