Thursday, August 14, 2014

Active Directory Integration - Barracuda Web Filter


Installing the DC Agent on your network will allow the Barracuda Web Filter to associate outgoing web requests with Active Directory users, log their activity, and apply user-specific or group-specific policies to outgoing connections without requiring users to log into the Barracuda Web Filter.

First, you will need to configure the Barracuda Web Filter to work with your Active Directory server on the Users/Groups > Authentication Services or Users/Groups > Authentication page. You will need one authentication service for each Active Directory domain. This page lets you specify the location of your LDAP server so your Barracuda Web Filter can:

  • Authenticate users using LDAP
  • Authenticate user group membership using LDAP
  • Allow you to assign exception policies to LDAP users.

Navigate to the Users/Groups > Authentication Services or Users/Groups > Authentication page, select the LDAP tab, and fill out all of the needed information:

  • LDAP Server - The IP address of your LDAP or Active Directory server.
  • LDAP Port - The port used by your LDAP or Active Directory server. The default is port 389.
  • LDAP Search Base - The base distinguished name (DN) for the directory. For example, if your domain is test.com, your base DN might bedc=test,dc=com.
  • Bind DN - The distinguished name (DN) of a user in your LDAP directory that has read access to all the users in LDAP. The Barracuda Web Filter uses the distinguished name to look up users in the LDAP database so the users can be assigned to exception policies and displayed on the Users/Groups > Accounts View page.
  • Bind Password - The password for the user you specified in the Bind DN field.
  • UID Attribute - The attribute that contains the user's ID. For Active Directory, it is recommended that you use sAMAccountName. For OpenLDAP, it is recommended that you use uid.

17 comments:

  1. A debt of gratitude is in order for posting this data. I simply need to tell you that I simply look at your site and I discover it exceptionally fascinating and enlightening. I can hardly wait to peruse loads of your posts. http://jointenterprisetechnologies.com

    ReplyDelete
  2. A very informative site. The way you have share this information is really very appreciative. Hope to see more on this topic here.
    123movies

    ReplyDelete
  3. At this point in my writing career, I simply want to get more visibility for your writing and I will write for free as long as you are okay with me adding a small author bio section next to each blog post about myself.Facebook Video Downloader

    ReplyDelete
  4. Thanks very much for your helpful tips!! Those things happen to me on a regular basis and I don’t know what to do but you helped me a lot! Thanks again.
    Youtube Video Downloader

    ReplyDelete
  5. Even if someone is currently employed, ongoing education and certification can help them along their career path. For people looking to branch out or considering pursuing a career in the IT field, this is an excellent way for them to start. Comptia A+ Training London

    ReplyDelete
  6. In the previous couple of decades there has been an upset in figuring and correspondences, and all signs are that mechanical advancement and utilization of information technology will proceed at a fast pace. Klik hier

    ReplyDelete
  7. Planning (or upgrading) a structure to exploit daylight and warmth is utilizing uninvolved solar power. Zonnepanelen

    ReplyDelete
  8. One of them said about PowerPoint: "My history educator worked superbly with Power Points. He would put them on the web, which made for extremely incredible audits. top reason to know why your business needs customized software

    ReplyDelete
  9. Wow, cool post. I’d like to write like this too – taking time and real hard work to make a great article… but I put things off too much and never seem to get started. Thanks though. freelance web designer london

    ReplyDelete
  10. or roadside bombs that are triggered by a shooter via radio communication equipment from hidden places. IEDs have been reported as the No.1 cause of casualties to US and coalition forces in Iraq and Afghanistan over the past decade. Drone Jammer

    ReplyDelete
  11. Generally speaking, there are two types of devices used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers) and active devices (which we will call cell-site simulators) Counter Drone

    ReplyDelete
  12. This Is Really Great Work. Thank You For Sharing Such A helpful And Useful Information Here In The Blog For Students.
    cheap dissertation writing service

    ReplyDelete
  13. When introducing solar panels, there is no huge scale establishment required. They in this manner require next to no space to introduce. This is significant with regards to quickly developing districts and towns. Zonnepanelen installateur

    ReplyDelete
  14. If not, brand harm could result. Point of confinement SMS messages to close to 160 characters. SMS API Service

    ReplyDelete
  15. Surveillance of mechanical advancement of contenders just as to make oneself aware of new participants to the field topcatbreeds

    ReplyDelete
  16. PV panels are the essence of the solar energy set-up.Zonnepanelen installateur

    ReplyDelete
  17. Remain informed about all the newest news, particular events, extraordinary adventures, and be the primary to receive choose provides from Parq Vancouver. From the video games you love on|you like} already to the ones everybody has been waiting for — explore our expansive sport catalog and discover the place to play them. See our new brand story come to life on-line and interact with all of the issues that make it so distinctive. Exciting, new features; simple, intuitive navigation; and so much extra. In honor of your service, we offer discounts of as much as} 10% for hotel rooms to all Military personnel yr round. Whether it’s on the nightclub or on the solely dayclub 우리카지노 in South Florida, visitors can anticipate properly liked|the most popular} names to make an appearance.

    ReplyDelete

Where Do I Start With SASE Evaluations?

Gartner® Report: Where Do I Start With SASE Evaluations? Where to start with SASE Secure access service edge (SASE) is revolutionizing the w...