It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure SAML 2.0 Configuration

  • Last updated on

The Barracuda SecureEdge Manager allows administrators to configure and authenticate Security Assertion Markup Language (SAML) as an identity provider for the workspace.

saml2-03.png

Configure SAML 2.0

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.

  2. In the left menu, click the Tenants/Workspaces icon and select the workspace you want to configure SAML 2.0 as an identity provider for.

  3. In the left menu, click Identity > Settings.

    goto-id-settings.png

  4. The Settings page opens. In the Identity Providers section, click Add Identity Provider.

    add-saml-id.png

  5. From the drop-down menu, select SAML 2.0.

    select-saml2.png

  6. The Add Identity Provider page opens. Specify the values for the following:

    • Display Name – Enter display name.

    • Sign In Endpoint – Enter the sign-in endpoint.

    • Signing Cert – Enter the signing certificate.

      saml-signin-settings.png

  7. Click Save.

  8. Under Information needed by your Identity Provider, you receive an Entity ID and ACS URL.

    saml.png

  9. Click Finish.

  10. In the Identity Providers table, you can see that the identity provider SAML 2.0 has been added and under the fieldname STATUS the text now states Active with a green check mark.

    saml2-active.png

Edit SAML 2.0

To edit the SAML 2.0 identity provider:

  1. In the left menu, click the Tenants/Workspaces icon and select the workspace you want to edit the SAML 2.0 identity provider for.

  2. Go to Identity > Settings.

  3. The Settings page opens. In the Identity Providers section, you can see that SAML 2.0 is displayed as your identity provider.

  4. To edit your SAML 2.0 account, click on the pencil icon.

    saml2-edit.png

  5. The Edit Identity Provider page opens. Edit the value you are interested in. For example, Display Name or Signing Cert. Note: You cannot change the value for Sign In Endpoint as the option Sign In Endpoint is disabled.

    saml2-04.png

  6. Click Save.

Remove SAML 2.0

  1. Go to Identity > Settings. The Settings page opens.

  2. In the Identity Providers section, you can see that SAML 2.0 is displayed.

  3. To remove SAML 2.0, click on the trash can icon.

    saml2-06.png

  4. The Remove Identity Provider page opens.

    rm-id-provider.png

     

  5. Click OK to confirm.

(Optional) Test SAML 2.0

If you must test SAML 2.0 quickly, proceed with the following steps:

  1. On the Settings page in the Identity Providers section, click the icon of three vertical dots to test the identity provider.

    saml2-07.png

  2. Click Test Identity Provider.

  3. To authenticate your identity provider, follow the authentication instructions on screen.

  4. Enter your credentials to authenticate with your identity provider.

  5. After logging into your account, you receive the confirmation message that the authentication was successful. You can also see verification values for fieldnames such as nickname, name, email, email verified, and iss.

    saml-05.png

The Test Identity Provider feature for SAML 2.0 can be successfully completed and verified with any user directory, or even with no user directory, configured for your workspace.

(Optional) Set Up SAML

  1. On the Settings page in the Identity Providers section, click the icon of three vertical dots to test the identity provider.

    saml2-08.png

  2. Click Setup SAML.

  3. The Setup SAML page open.

    saml2-09.png

You can use the ACS URL and Entity ID values to update an existing SAML configuration.

Next Steps