How to Deploy the CloudGen Access User Directory Connector with Vx

How to Deploy the CloudGen Access User Directory Connector with Vx

  1. Go to the Identity > Settings page in the Console and create a user directory. (See Add User Directory)

  2. Copy the enrollment token to the clipboard.     

  3. Continue with instructions for Entra ID/Google Workspace just below, or LDAP/Okta.
    Note: After setting the parameters, select Enable to enable (means the connector will start on boot-up) or Start to start (will not start automatically on boot-up) the connector.

For Microsoft Entra ID and Google Workspace:          

  1. Select Services > Connector > Configure > Authorize.

  2. Enter the enrollment token.

  3. See Entra ID or Google Workspace below to continue.


    For Microsoft Entra ID:
    You will see something like this example output:  (note that the token/code is always unique)

>>> /services/connector/configure Select option: Authorize ? Enter enrollment token: http://enterprise.barracuda.com/……

2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...

Please authorize this connector to access your Entra ID directory information

                     To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the

code CTLF7GLW2 to authenticate.  (Note that this is a sample code)

                     After providing the code in a browser, you should see a message like this in the backend:

Authorization was successful 2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector

          Finally, check the Settings page to make sure the sync was successful.

For Google Workspace:  

You will see something like this example output:  (note that the token/code is always unique)

>>> /services/connector/configure Select option: Authorize

? Enter enrollment token: http://enterprise.barracuda.com/……

2022-09-29 14:34:20 [db](INFO) - Configuring system with local DB 2022-09-29 14:34:20 [main](INFO) - CGA Connector version x.y.z 2022-09-29 14:34:20 [main](INFO) - Initializing with API api.enterprise.barracuda.com/...

       Copy and paste the authorization code. It should return "Authorized successfully".

2022-09-29 14:35:03 [main](INFO) - CGA Connector is terminating > Authorized successfully, enabling and restarting connector

       Finally, check the Settings page to make sure the sync was successful.


       For LDAP and Okta:

  1. Select Services > Connector > Configure > Set

  2. Set up your required parameters for authentication, including the enrollment_token. Here are the parameters to set for LDAP:

FYDE_LOGLEVEL: debug
FYDE_LDAP_HOST: 10.x.x.x
FYDE_LDAP_PROFILE: ad
FYDE_LDAP_USER_SEARCH_BASE: dc=cga,dc=com
FYDE_LDAP_GROUP_SEARCH_BASE: dc=cga,dc=com
FYDE_LDAP_AUTH_METHOD: simple
FYDE_LDAP_AUTH_USERNAME: administrator@cga.com 
FYDE_LDAP_AUTH_PASSWORD:  
FYDE_LDAP_USE_STARTTLS: sync  

Here are the parameters to set for OKTA. Log into Okta and create the token under Security > API > Tokens.

FYDE_OKTA_AUTH_TOKEN: 'zzz'  

FYDE_OKTA_DOMAINNAME: 'mydomain.okta.com'