Specifications
49 
With trust playing such a significant part of remote access, the Barracuda SSL VPN solution has been 
designed to allow for either ‘coarsely grained’ or ‘finely grained’ access control. This approach allows 
the product to mirror more closely the actual trust relationships present in the real world. In 
conjunction with multi-tiered authentication schemes, our security model is much more advanced than 
those offered by conventional VPN solutions. 
Levels of Trust 
Trust is administered in measures - the more trust a user has the more privileges they are granted. 
Again the opposite is said for someone who has a lesser degree of trust and consequently is given a 
lesser level of ownership and access. 
The Barracuda SSL VPN appliance follows this tried and tested pattern. With the access control 
framework, ‘administrators’ are seen as the most trusted users, seeing as they control the appliance. 
‘Power users’ are given a lesser measure of control. Finally the standard user has a lesser degree of 
trust and therefore potentially the least level of access and responsibility. 
Access Control Architecture 
The access control framework has been designed to tackle the following main issues. 
•  Users and Groups: Each organizations view on users and groups is almost always different. 
They do though share common behavior, e.g. ‘Add User/Group’ or ‘Delete User/Group’. It is 
also likely that the organization’s user/group directory already existed prior to the 
introduction of this appliance, for example an existing Active Directory domain or LDAP 
directory. The variety offered by such choice invariably gives rise to a number of different 
approaches and implementations. 
•  Resource Access: The intended outcome when implementing an SSL VPN solution is to 
allow remote access to network-based resources. The number of types of network resource is 
relatively varied and new methods are likely to appear. Each resource deployed can have very 
different access requirements, such as read or write permissions. 
•  Resource Distribution: A resource created within the system must be easily made accessible 
to those users that require it. Assigning resources on a per-user basis should be avoided 
wherever possible. 
•  Resource Permissions: Resources can have a range of permissions to limit how they may be 
assigned. When a resource is assigned to a user the user must be restricted to the set 
permissions. For example, a super user may create a resource to administer creation and 
assignment of application shortcuts only. This is assigned to a user who attempts to delete an 
existing application shortcut, this operation will be declined. 
In order to resolve the aforementioned issues the access control architecture relies on three key 
entities: 
•  Principal: The intended ‘consumer’ of the resources, i.e. a user or a group. 
•  Resource: The networked resource, internal function or property item that the principal 
wishes to utilize, e.g. a Web-forward or the right to manage accounts. 
•  Policy: This is the relationship defined between the principal and resource. It is the 
component that ensures that only the right people can perform the right action. 










