You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Defender for Cloud Apps (CASB)](/cloud-app-security/what-is-cloud-app-security)
49
49
- Threat monitoring and analytics with [Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel/)
50
50
51
51
## Scenario description
@@ -58,7 +58,7 @@ As an Application Delivery Controller (ADC) and secure socket layer virtual priv
58
58
59
59
BIG-IP Local Traffic Manager (LTM) is for secure service publishing, while an Access Policy Manager (APM) extends BIG-IP functions that enable identity federation and single sign-on (SSO).
60
60
61
-
With integration, you achieve the protocol transition to secure legacy, or non-Azure AD-integrated services, with controls such as
61
+
With integration, you achieve the protocol transition to secure legacy, or non-Azure AD-integrated services, with controls such as:
@@ -153,27 +153,27 @@ The BIG-IP version 13.1 Guided Configuration wizard, minimizes time and effort t
153
153
154
154
Guided Configuration version 16.x has the Easy Button feature: admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled by the APM Guided Configuration wizard and Microsoft Graph. This integration between BIG-IP APM and Azure AD ensures applications support identity federation, SSO, and Azure AD Conditional Access, without the management overhead of doing so for each app.
155
155
156
-
Tutorials for using Easy Button templates:
156
+
Tutorials for using Easy Button templates, *F5 BIG-IP Easy Button for SSO to*:
157
157
158
-
-[F5 BIG-IP Easy Button for SSO to Kerberos applications](f5-big-ip-kerberos-easy-button.md)
-[F5-BIG-IP Easy Button for SSO to SAP ERP](f5-big-ip-sap-erp-easy-button.md)
170
+
-[SAP ERP](f5-big-ip-sap-erp-easy-button.md)
171
171
172
172
## Azure AD B2B guest access
173
173
174
174
Azure AD B2B guest access to SHA-protected applications is possible, but might require steps not in the tutorials. One example is Kerberos SSO, when a BIG-IP performs kerberos constrained delegation (KCD) to obtain a service ticket from domain controllers. Without a local representation of a local guest user, a domain controller won't honor the request because there's no user. To support this scenario, ensure external identities are flowed down from your Azure AD tenant to the directory used by the application.
175
175
176
-
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md).
176
+
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
177
177
178
178
## Next steps
179
179
@@ -188,7 +188,7 @@ Our recommendation is to start with an application that isn’t published via a
188
188
189
189
The following interactive guide illustrates implementing SHA with a template, and the end-user experience.
0 commit comments