Skip to content

Commit 0c7c43f

Browse files
authored
Merge pull request #186844 from MicrosoftDocs/master
1/31 AM Publish
2 parents 8e16d30 + 354d0e9 commit 0c7c43f

File tree

134 files changed

+1578
-1233
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+1578
-1233
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45237,6 +45237,21 @@
4523745237
"redirect_url": "/azure/cognitive-services/translator/custom-translator/v2-preview/beginners-guide",
4523845238
"redirect_document_id": true
4523945239
},
45240+
{
45241+
"source_path_from_root": "/articles/azure/devtest-labs/scripts/create-verify-virtual-machine-in-lab-cli.md",
45242+
"redirect_url": "/azure/devtest-labs/samples-cli",
45243+
"redirect_document_id": false
45244+
},
45245+
{
45246+
"source_path_from_root": "/articles/azure/devtest-labs/scripts/start-connect-virtual-machine-in-lab-cli.md",
45247+
"redirect_url": "/azure/devtest-labs/samples-cli",
45248+
"redirect_document_id": false
45249+
},
45250+
{
45251+
"source_path_from_root": "/articles/azure/devtest-labs/scripts/stop-delete-virtual-machine-in-lab-cli.md",
45252+
"redirect_url": "/azure/devtest-labs/samples-cli",
45253+
"redirect_document_id": false
45254+
},
4524045255
{
4524145256
"source_path_from_root": "/articles/azure-monitor/agents/azure-monitor-agent-install.md",
4524245257
"redirect_url": "/azure/azure-monitor/agents/azure-monitor-agent-manage",

articles/active-directory-b2c/partner-f5.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
2-
title: Tutorial to extend Azure Active Directory B2C with F5 BIG-IP
2+
title: Tutorial to enable Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
33
titleSuffix: Azure AD B2C
44
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5-
author: gargi-sinha
6-
ms.author: gasinh
5+
author: NishthaBabith-V
6+
ms.author: v-nisba
77
manager: martinco
88
ms.service: active-directory
99
ms.subservice: B2C
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.date: 10/15/2021
13+
ms.reviewer: v-nisba
1314
---
1415

15-
# Tutorial: Extend Azure Active Directory B2C using F5 BIG-IP
16+
# Tutorial: Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
1617

1718
In this sample tutorial, learn how to integrate Azure Active Directory (Azure AD) B2C with [F5 BIG-IP Access Policy Manager (APM)](https://www.f5.com/services/resources/white-papers/easily-configure-secure-access-to-all-your-applications-via-azure-active-directory). This tutorial demonstrates how legacy applications can be securely exposed to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA), and Single sign-on (SSO).
1819

@@ -73,8 +74,6 @@ The following diagram illustrates the Service Provider (SP) initiated flow for t
7374
| 5. | OIDC client asks the authorization server to exchange authorization code for an ID token |
7475
| 6. | BIG-IP APM grants user access and injects the HTTP headers in the client request forwarded on to the application |
7576

76-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
77-
7877
## Azure AD B2C Configuration
7978

8079
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](tutorial-create-user-flows.md).
@@ -337,6 +336,8 @@ You will then be redirected to sign up and authenticate against your Azure AD B2
337336

338337
![Screenshot shows post sign in welcome message](./media/partner-f5/welcome-page.png)
339338

339+
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
340+
340341
### Supplemental configurations
341342

342343
**Single Log-Out (SLO)**
@@ -358,7 +359,7 @@ One optional step for improving the user login experience would be to suppress t
358359

359360
![Screenshot shows optimized login flow](./media/partner-f5/optimized-login-flow.png)
360361

361-
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
362+
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
362363

363364
2. Navigate to **Access** > **Profiles/ Policies** > **Access Profiles (Per-session Policies)** and select the **Per-Session Policy** Edit link for the application’s policy object.
364365

@@ -405,11 +406,11 @@ Your application’s logs would then help understand if it received those attrib
405406

406407
![Screenshot shows the error message](./media/partner-f5/error-message.png)
407408

408-
This is a policy violation due to the BIG-IP’s inability to validate the signature of the token issued by Azure AD B2C. The same access log should be able to provide more detail on the issue.
409+
This is a policy violation due to the BIG-IP’s inability to validate the signature of the token issued by Azure AD B2C. The same access log should be able to provide more detail on the issue.
409410

410411
![Screenshot shows the access logs](./media/partner-f5/access-log.png)
411412

412-
Exact root cause is still being investigated by F5 engineering, but issue appears related to the AGC not enabling the Auto JWT setting during deployment, thereby preventing the APM from obtaining the current token signing keys.
413+
Exact root cause is still being investigated by F5 engineering, but issue appears related to the AGC not enabling the Auto JWT setting during deployment, thereby preventing the APM from obtaining the current token signing keys.
413414

414415
Until resolved, one way to work around the issue is to manually enable this setting.
415416

@@ -421,7 +422,7 @@ Your application’s logs would then help understand if it received those attrib
421422

422423
4. Check the **Use Auto JWT** box then select **Discover**, followed by **Save**.
423424

424-
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
425+
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
425426

426427
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
427428

articles/active-directory/develop/scenario-daemon-overview.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,14 @@ Here are some examples of use cases for daemon apps:
3434

3535
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or Azure SQL Database for a cache.
3636

37+
> [!NOTE]
38+
> You can't deploy a daemon application to a regular user's device, and a regular user can't access a daemon application. Only a limited set of IT administrators can access devices that have daemon applications running, so a bad actor can't access a client secret or token from device traffic and act on behalf of the daemon application. The daemon application scenario doesn't replace device authentication.
39+
>
40+
> Examples of non-daemon applications:
41+
> - A mobile application that accesses a web service on behalf of an application, but not on behalf of a user.
42+
> - An IoT device that accesses a web service on behalf of a device, but not on behalf of a user.
43+
>
44+
3745
Applications that acquire a token for their own identities:
3846

3947
- Are confidential client applications. These apps, given that they access resources independently of users, need to prove their identity. They're also rather sensitive apps. They need to be approved by the Azure Active Directory (Azure AD) tenant admins.

0 commit comments

Comments
 (0)