Go to the Settings page in the Console and create a user directory. (See Add User Directory)
Copy the enrollment token to the clipboard.
Continue with instructions for Azure/Google Workspace just below, or LDAP/Okta.
For Azure AD and Google Workspace:
Select Services > Connector > Configure > Authorize.
Enter the enrollment token.
See Azure or Google Workspace below to continue.
For Azure directory:
You will see something like this example output: (note that the token/code is always unique)
>>> /services/connector/configure Select option: Authorize ? Enter enrollment token: http://enterprise.barracuda.com/……
2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...
Please authorize this connector to access your Azure AD directory information
To sign in, use a web browser to open the page https://microsoft.com/devicelogin
and enter the
code CTLF7GLW2 to authenticate. (Note that this is a sample code)
After providing the code in a browser, you should see a message like this in the backend:
Authorization was successful 2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector
Finally, check the Settings page to make sure the sync was successful.
For Google Workspace:
You will see something like this example output: (note that the token/code is always unique)
>>> /services/connector/configure Select option: Authorize
? Enter enrollment token: http://enterprise.barracuda.com/……
2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...
Copy and paste the authorization code. It should return "Authorized successfully".
2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector
Finally, check the Settings page to make sure the sync was successful.
For LDAP and Okta:
Select Services > Connector > Configure > Set.
Set up your required parameters for authentication, including the enrollment_token. Here are the parameters to set for LDAP:
FYDE_LOGLEVEL: debug
FYDE_LDAP_HOST: 10.x.x.x
FYDE_LDAP_PROFILE: ad
FYDE_LDAP_USER_SEARCH_BASE: dc=cga,dc=com
FYDE_LDAP_GROUP_SEARCH_BASE: dc=cga,dc=com
FYDE_LDAP_AUTH_METHOD: simple
FYDE_LDAP_AUTH_USERNAME: administrator@cga.com
FYDE_LDAP_AUTH_PASSWORD:
FYDE_LDAP_USE_STARTTLS: sync
Here are the parameters to set for OKTA. Log into Okta and create the token under Security > API > Tokens.
FYDE_OKTA_AUTH_TOKEN: 'zzz'
FYDE_OKTA_DOMAINNAME: 'mydomain.okta.com'
After setting the parameters, select Enable to enable (means the connector will start on boot-up) or Start to start (will not start automatically on boot-up) the connector.