Active Directory Authentication
Use Active Directory (AD) authentication to store and administer Barracuda Cloud Control user accounts via your organization's Active Directory servers.
Before adding users to Barracuda Cloud Control via your organization's Active Directory servers, verify the following:
Users are enabled;
Users are members of the domain;
Mail attribute is set for each user; and
proxyAddress attribute is set to each user's primary email address
The primary email address uses the format SMTP:user@domain.com. The optional secondary email address uses the format smtp:user_alt@domain.com.
Barracuda Networks highly recommends creating an additional administrator account using an independent domain that does not use LDAP authentication. This allows you to access to your Barracuda Cloud Control account if your AD server goes down or fails.
To ensure uninterrupted access to LDAP from the Barracuda Cloud, you must allow incoming connections from the following IP addresses.
35.170.131.81
54.156.244.63
54.209.169.44
NOTE that Barracuda Networks currently does not support the ability to exclude only some users from LDAP synchronization.
In this Section
- Understanding LDAP Authentication
- How to Add Entitlements via LDAP Group Membership
- How to Switch Between LDAP Environments
- New Requirements for LDAP Authentication
- LDAP Active Directory and Microsoft Entra ID
- Single Sign-On with Microsoft Entra ID (OAuth)
- How to Authenticate On-Premise Active Directory with Microsoft Entra ID
- Microsoft Entra MFA Requirements for Microsoft CSPs
Contact Us
Barracuda Campus
Barracuda Support