- Go to the Settings page in the Console and create a user directory. (See Add User Directory) 
- Copy the enrollment token to the clipboard. 
- Continue with instructions for Azure/Google Workspace just below, or LDAP/Okta. 
For Azure AD and Google Workspace:
- Select Services > Connector > Configure > Authorize. 
- Enter the enrollment token. 
- See Azure or Google Workspace below to continue. 
 
 For Azure directory:
 You will see something like this example output: (note that the token/code is always unique)
          >>> /services/connector/configure Select option: Authorize
          ? Enter enrollment token:  http://enterprise.barracuda.com/……          2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB
          2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z
          2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...Please authorize this connector to access your Azure AD directory information
To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the
code CTLF7GLW2 to authenticate. (Note that this is a sample code)
After providing the code in a browser, you should see a message like this in the backend:
          Authorization was successful
          2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating
          > Authorized successfully, enabling and restarting connectorFinally, check the Settings page to make sure the sync was successful.
For Google Workspace:
You will see something like this example output: (note that the token/code is always unique)
>>> /services/connector/configure Select option: Authorize
? Enter enrollment token: http://enterprise.barracuda.com/……
          2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB
          2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z
          2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/... Copy and paste the authorization code. It should return "Authorized successfully".
          2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating
          > Authorized successfully, enabling and restarting connectorFinally, check the Settings page to make sure the sync was successful.
   For LDAP and Okta:
- Select Services > Connector > Configure > Set. 
- Set up your required parameters for authentication, including the enrollment_token. Here are the parameters to set for LDAP: 
FYDE_LOGLEVEL: debug
 FYDE_LDAP_HOST: 10.x.x.x
 FYDE_LDAP_PROFILE: ad
 FYDE_LDAP_USER_SEARCH_BASE: dc=cga,dc=com
 FYDE_LDAP_GROUP_SEARCH_BASE: dc=cga,dc=com
 FYDE_LDAP_AUTH_METHOD: simple
 FYDE_LDAP_AUTH_USERNAME: administrator@cga.com 
 FYDE_LDAP_AUTH_PASSWORD: 
 FYDE_LDAP_USE_STARTTLS: sync
Here are the parameters to set for OKTA. Log into Okta and create the token under Security > API > Tokens.
FYDE_OKTA_AUTH_TOKEN: 'zzz'
FYDE_OKTA_DOMAINNAME: 'mydomain.okta.com'
After setting the parameters, select Enable to enable (means the connector will start on boot-up) or Start to start (will not start automatically on boot-up) the connector.

