Required use of multi-factor authentication (MFA) impacts all Barracuda Networks partners who are Microsoft CSPs and who configure Azure AD in Barracuda Cloud Control. Barracuda Cloud Control does not yet support the use of Azure MFA, which causes login failures if Azure MFA is enabled or required. As a workaround to bypass MFA, you can configure a conditional access policy in Azure AD for users signing in from trusted IPs or create an app password to allow apps access to your Microsoft 365 account.
Conditional Access Policy
To configure a conditional access policy and enable trusted IPs, refer to the section on Trusted IPs in the Microsoft support article Configure Azure Multi-Factor Authentication settings.
Contact your system administrator to obtain the external IPs necessary to create the conditional access policy.
To generate an app password to connect apps to Microsoft 365, refer to the Microsoft article Create an app password for Microsoft 365. Using an app password allows Barracuda to run Exchange Integration jobs without the need to authenticate with MFA.