Skip to content

Commit 0b5a579

Browse files
authored
Consistency update
1 parent 7ad3ee9 commit 0b5a579

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,12 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
3131

3232
This scenario looks at the classic legacy application using HTTP authorization headers to control access to protected content.
3333

34-
Being legacy, the application lacks any form of modern protocols to support a direct integration with Azure AD. Modernizing the app is also costly, requires careful planning, and introduces risk of potential downtime.
34+
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
3535

36-
One option would be to consider [Azure AD Application Proxy](../app-proxy/application-proxy.md), to gate remote access to the application.
36+
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and headers-based SSO, significantly improving the overall security posture of the application.
3737

38-
Another approach is to use an F5 BIG-IP Application Delivery Controller (ADC), as it too provides the protocol transitioning required to bridge legacy applications to the modern ID control plane.
38+
Note: Organizations can also gain remote access to their applications with [Azure AD Application Proxy](../app-proxy/application-proxy.md)
3939

40-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for both remote and local access.
4140

4241
## Scenario architecture
4342

@@ -164,7 +163,7 @@ Consider the **Azure Service Account Details** be the BIG-IP client application
164163

165164
2. Enable **Single Sign-On (SSO) & HTTP Headers**
166165

167-
3. Enter the **Tenant Id**, **Client ID**, and **Client Secret** you noted down during tenant registration
166+
3. Enter the **Tenant Id**, **Client ID**, and **Client Secret** you noted when registering the Easy Button client in your tenant.
168167

169168
4. Confirm the BIG-IP can successfully connect to your tenant, and then select **Next**
170169

0 commit comments

Comments
 (0)