You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,19 @@
1
1
---
2
-
title: Tutorial to extend Azure Active Directory B2C with F5 BIG-IP
2
+
title: Tutorial to enable Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
3
3
titleSuffix: Azure AD B2C
4
4
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5
-
author: gargi-sinha
6
-
ms.author: gasinh
5
+
author: NishthaBabith-V
6
+
ms.author: v-nisba
7
7
manager: martinco
8
8
ms.service: active-directory
9
9
ms.subservice: B2C
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
12
ms.date: 10/15/2021
13
+
ms.reviewer: v-nisba
13
14
---
14
15
15
-
# Tutorial: Extend Azure Active Directory B2C using F5 BIG-IP
16
+
# Tutorial: Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
16
17
17
18
In this sample tutorial, learn how to integrate Azure Active Directory (Azure AD) B2C with [F5 BIG-IP Access Policy Manager (APM)](https://www.f5.com/services/resources/white-papers/easily-configure-secure-access-to-all-your-applications-via-azure-active-directory). This tutorial demonstrates how legacy applications can be securely exposed to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA), and Single sign-on (SSO).
18
19
@@ -73,8 +74,6 @@ The following diagram illustrates the Service Provider (SP) initiated flow for t
73
74
| 5. | OIDC client asks the authorization server to exchange authorization code for an ID token |
74
75
| 6. | BIG-IP APM grants user access and injects the HTTP headers in the client request forwarded on to the application |
75
76
76
-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
77
-
78
77
## Azure AD B2C Configuration
79
78
80
79
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](tutorial-create-user-flows.md).
@@ -337,6 +336,8 @@ You will then be redirected to sign up and authenticate against your Azure AD B2
337
336
338
337

339
338
339
+
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
340
+
340
341
### Supplemental configurations
341
342
342
343
**Single Log-Out (SLO)**
@@ -358,7 +359,7 @@ One optional step for improving the user login experience would be to suppress t
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
362
+
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
362
363
363
364
2. Navigate to **Access** > **Profiles/ Policies** > **Access Profiles (Per-session Policies)** and select the **Per-Session Policy** Edit link for the application’s policy object.
364
365
@@ -405,11 +406,11 @@ Your application’s logs would then help understand if it received those attrib
405
406
406
407

407
408
408
-
This is a policy violation due to the BIG-IP’s inability to validate the signature of the token issued by Azure AD B2C. The same access log should be able to provide more detail on the issue.
409
+
This is a policy violation due to the BIG-IP’s inability to validate the signature of the token issued by Azure AD B2C. The same access log should be able to provide more detail on the issue.
409
410
410
411

411
412
412
-
Exact root cause is still being investigated by F5 engineering, but issue appears related to the AGC not enabling the Auto JWT setting during deployment, thereby preventing the APM from obtaining the current token signing keys.
413
+
Exact root cause is still being investigated by F5 engineering, but issue appears related to the AGC not enabling the Auto JWT setting during deployment, thereby preventing the APM from obtaining the current token signing keys.
413
414
414
415
Until resolved, one way to work around the issue is to manually enable this setting.
415
416
@@ -421,7 +422,7 @@ Your application’s logs would then help understand if it received those attrib
421
422
422
423
4. Check the **Use Auto JWT** box then select **Discover**, followed by **Save**.
423
424
424
-
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
425
+
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
425
426
426
427
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-daemon-overview.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,14 @@ Here are some examples of use cases for daemon apps:
34
34
35
35
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or Azure SQL Database for a cache.
36
36
37
+
> [!NOTE]
38
+
> You can't deploy a daemon application to a regular user's device, and a regular user can't access a daemon application. Only a limited set of IT administrators can access devices that have daemon applications running, so a bad actor can't access a client secret or token from device traffic and act on behalf of the daemon application. The daemon application scenario doesn't replace device authentication.
39
+
>
40
+
> Examples of non-daemon applications:
41
+
> - A mobile application that accesses a web service on behalf of an application, but not on behalf of a user.
42
+
> - An IoT device that accesses a web service on behalf of a device, but not on behalf of a user.
43
+
>
44
+
37
45
Applications that acquire a token for their own identities:
38
46
39
47
- Are confidential client applications. These apps, given that they access resources independently of users, need to prove their identity. They're also rather sensitive apps. They need to be approved by the Azure Active Directory (Azure AD) tenant admins.
0 commit comments