How to Create a SAML Endpoint in Microsoft Azure and Client-to-Site SAML Configuration
Follow the guide below to create a SAML endpoint in Microsoft Azure and to configure a Barracuda CloudGen Firewall to use SAML authentication for the client-to-site VPN service.
Also, if you want to use FIDO2 and Windows Hello, consider to use the article from Microsoft: https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-enable-passkey-fido2#enable-passkey-fido2-authentication-method. Note that FIDO2 and Windows Hello support a login by using face recognition, fingerprints, Yubikeys and other keys.
Before You Begin
Create and configure a VPN service. For more information, see VPN.
You must have an existing user group in your Microsoft Entra ID. For more information, see https://learn.microsoft.com/en-us/entra/fundamentals/how-to-manage-groups.
An Advanced Remote Access subscription is required. For more information on subscriptions, see Base Licensing and Subscriptions.
Step 1. Create a SAML Endpoint in Microsoft Azure
Log into the Azure portal: https://portal.azure.com
In the left menu, click All services and search for Microsoft Entra ID.
Click Microsoft Entra ID.
In the left menu of the Microsoft Entra ID blade, click Enterprise applications.
The Enterprise applications blade opens. Click Overview.
In the Overview blade, click New application.
The Browse Microsoft Entra Gallery blade opens. Click Create your own application.
Enter the name of your application, and select Integrate any other application you don't find in the gallery (Non-gallery).
Click Create.
After the application is successfully deployed, it automatically opens the Overview blade of the created application.In the left menu, select Properties.
In the Properties blade, disable Assignment required and click Save.
In the left menu, click Single sign-on.
The Single sign-on blade opens. Select SAML.
The SAML-based Sign-on blade opens. Copy the Login URL.
Click Edit next to Basic SAML Configuration.
Click Add reply URL and paste the copied URL.
Open the SAML configuration on your Barracuda CloudGen Firewall, and copy the Service Provider Entity ID.
In the Basic SAML Configuration blade, click Add identifier and paste the copied login URL.
Click Save.
Click X to close the Basic SAML Configuration blade.
In the User Attribute & Claims section, click Edit.
The User Attributes & Claims blade opens. Click Add a group claim.
The Group Claims blade opens. Select Security groups and click Save.
Click X to close the User Attributes & Claims blade.
If the number of groups a user is in exceeds a certain limit (150 for SAML, 200 for JWT) then an overage claim will be added, the claim sources pointing at the graph endpoint containing the list of groups for the user. (For detailed information, see Claims in SAML tokens in the Microsoft documentation.) The firewall does not use this link to extract user groups and therefore generates a "DENY: Group did not match" security entry in the VPN logs in this case, as no group policy containing a group filter will match. This can be avoided by creating a group filter, preventing Microsoft from sending a link pointing to the groups. For more information, see Configure group claims for applications by using Microsoft Entra ID.
In the SAML-based Sign-on blade, click Download to download the Federation Metadata XML.
Note that some browsers might block the *.xml file.Save the file to your local machine.
Step 2. Configure the Barracuda CloudGen Firewall to Use SAML Authentication
Connect to your Barracuda CloudGen Firewall and log in.
Go to CONFIGURATION > Configuration Tree > Infrastructure Services > Authentication Service.
In the left menu, click SAML/ADFS Authentication.
Click Lock.
In the SAML General Information section, set Activate Scheme to yes.
In the Identity Provider section, click Ex/Import. Then, click Import from File... and select the file retrieved in Step 1.
Click Send Changes.
In the Attributes section, specify the Assertion Name ID and select um:oasis:names:tc:SAML:1.1:nameid-format:emailAddress from the drop-down menu.
Click Send Changes.
Specify values for the following:
User Attribute – Select Name ID (um:oasis:names:tc:SAML:1.1:nameid-format:emailAddress) from the drop-down menu.
Group Attribute – Select Attribute(Groups) from the drop-down menu.
In the Certificates section, specify values for the following:
Enable Assertion Encryption – Clear the check box.
Enable Assertion Signing – Clear the check box.
In the left menu of the SAML/ADFS Authentication window, click Configuration Mode and select Switch to Advanced.
In the Endpoints section, specify values for the following if SAML/ADFS is not used for Firewall Authentication. Otherwise, you can skip this step.
Use Hostname from – Select Explicit-Hostname from the drop-down menu.
Explicit Hostname – Enter
localhost.
Click Send Changes and Activate.
On the firewall, go to CONTROL > Services > Box Services.
Restart the authentication daemon (phibs).
Go back to CONFIGURATION > Configuration Tree > Infrastructure Services > Authentication Service.
In the left menu, click SAML/ADFS Authentication.
Click Lock.
In the Service Provider Metadata section, export the metadata by clicking Generate Data.
Copy the information and save it to your local machine in an .xml file. This file has to be updloaded in Azure at a later stage.
Click Send Changes and Activate.
Contact Us
Barracuda Campus
Barracuda Support