Skip to content

Commit 0c8a851

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 26b9a26 + 82f8fda commit 0c8a851

27 files changed

+904
-263
lines changed

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/06/2021
12+
ms.date: 01/14/2022
1313
ms.author: ryanwi
1414
ms.reviewer: hirsin, phsignor
1515
ms.custom: aaddev, fasttrack-edit, contperf-fy21q1, identityplatformtop40, has-adal-ref

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
In this article, you’ll learn to implement Secure Hybrid Access (SHA) with single sign-on (SSO) to header-based applications using F5’s BIG-IP Easy Button Guided Configuration.
1919

20-
Configuring a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
20+
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
2121

2222
* Improved Zero Trust governance through Azure AD pre-authentication and authorization
2323

@@ -31,9 +31,13 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
3131

3232
For this scenario, we have a legacy application using HTTP authorization headers to control access to protected content.
3333

34-
Ideally, application access should be managed directly by Azure AD but being legacy it lacks any form of modern authentication protocol. Modernization would take considerable effort and time, introducing inevitable costs and risk of potential downtime. Instead, a BIG-IP deployed between the public internet and the internal application will be used to gate inbound access to the application.
34+
Being legacy, the application lacks any form of modern protocols to support a direct integration with Azure AD. Modernizing the app is also costly, requires careful planning, and introduces risk of potential impact.
3535

36-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application.
36+
One option would be to consider [Azure AD Application Proxy](/azure/active-directory/app-proxy/application-proxy), to gate remote access to the application.
37+
38+
Another approach is to use an F5 BIG-IP Application Delivery Controller, as it too provides the protocol transitioning required to bridge legacy applications to the modern ID control plane.
39+
40+
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for both remote and local access.
3741

3842
## Scenario architecture
3943

@@ -95,7 +99,9 @@ With the **Easy Button**, admins no longer go back and forth between Azure AD an
9599
96100
## Register Easy Button
97101

98-
Before a client or service can access Microsoft Graph, it must be trusted by the Microsoft identity platform. Registering with Azure AD establishes a trust relationship between your application and the IdP. BIG-IP must also be registered as a client in Azure AD, before the Easy Button wizard is trusted to access Microsoft Graph.
102+
Before a client or service can access Microsoft Graph, it must be trusted by the Microsoft identity platform.
103+
104+
The Easy Button client must also be registered as a client in Azure AD, before it is allowed to establish a trust relationship between each SAML SP instance of a BIG-IP published applications, and the IdP.
99105

100106
1. Sign-in to the [Azure AD portal](https://portal.azure.com/) using an account with Application Administrative rights
101107
2. From the left navigation pane, select the **Azure Active Directory** service
@@ -120,12 +126,13 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
120126

121127
## Configure Easy Button
122128

123-
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
129+
Next, step through the Easy Button configurations to federate and publish the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
124130

125131
1. From a browser, sign-in to the F5 BIG-IP management console
126132
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
127133
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key
128134
Once provisioned, the certificate can be used for every application published through Easy Button. You can also choose to upload a separate certificate for individual applications.
135+
129136
![Screenshot for Configure Easy Button- Import SSL certificates and keys](./media/f5-big-ip-easy-button-ldap/configure-easy-button.png)
130137

131138
4. Navigate to **Access > Guided Configuration > Microsoft Integration and select Azure AD Application**
@@ -143,7 +150,6 @@ The **Easy Button** template will display the sequence of steps required to publ
143150

144151
![Configuration steps flow](./media/f5-big-ip-easy-button-ldap/config-steps-flow.png)
145152

146-
Configuration steps flow
147153

148154
### Configuration Properties
149155

@@ -302,7 +308,7 @@ Enabling SSO allows users to access BIG-IP published services without having to
302308
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-easy-button-header/sso-http-headers.png)
303309

304310
>[!NOTE]
305-
> The APM session variables defined within curly brackets are CASE sensitive. If you enter EmployeeID when the Azure AD attribute name is being sent as employeeid, it will cause an attribute mapping failure. In case of any issues, troubleshoot using the session analysis steps to check how the APM has variables defined.
311+
> APM session variables defined within curly brackets are CASE sensitive. If you enter EmployeeID when the Azure AD attribute name is being defined as employeeid, it will cause an attribute mapping failure.
306312
307313
### Session Management
308314

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
In this article, you'll learn to implement Secure Hybrid Access (SHA) with single sign-on (SSO) to header-based applications that also require session augmentation through Lightweight Directory Access Protocol (LDAP) sourced attributes using F5’s BIG-IP Easy Button guided configuration.
1919

20-
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
20+
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
2121

2222
* Improved Zero Trust governance through Azure AD pre-authentication and authorization
2323

@@ -29,21 +29,23 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
2929

3030
## Scenario description
3131

32-
For this scenario, we have a legacy application using HTTP authorization headers to control access to protected content. Azure AD pre-authentication provides the user identifier, while other attributes fetched from an LDAP connected Human Resource (HR) system provide fine grained application permissions.
32+
For this scenario, we have a legacy application using HTTP authorization headers to control access to protected content.
3333

34-
Ideally, application access should be managed directly by Azure AD but being legacy it lacks any form of modern authentication protocol. Modernization would take considerable effort and time, introducing inevitable costs and risk of potential downtime.
34+
Being legacy, the application lacks any form of modern protocols to support a direct integration with Azure AD. Modernizing the app is also costly, requires careful planning, and introduces risk of potential impact.
3535

36-
Instead, a BIG-IP deployed between the public internet and the internal application will be used to gate inbound access to the application.
36+
One option would be to consider [Azure AD Application Proxy](/azure/active-directory/app-proxy/application-proxy), to gate remote access to the application.
3737

38-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application.
38+
Another approach is to use an F5 BIG-IP Application Delivery Controller, as it too provides the protocol transitioning required to bridge legacy applications to the modern ID control plane.
39+
40+
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for both remote and local access.
3941

4042
## Scenario architecture
4143

4244
The secure hybrid access solution for this scenario is made up of:
4345

44-
**Application:** BIG-IP published service to be protected by and Azure AD SHA.
46+
**Application:** BIG-IP published service to be protected by Azure AD SHA.
4547

46-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP APM. Trough SSO, Azure AD provides the BIG-IP with any required session attributes.
48+
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP APM. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
4749

4850
**HR system:** Legacy employee database acting as source of truth for fine grained application permissions.
4951

@@ -95,9 +97,9 @@ Prior BIG-IP experience isn't necessary, but you'll need:
9597

9698
## BIG-IP configuration methods
9799

98-
There are many methods to deploy BIG-IP for this scenario including a template-driven Guided Configuration wizard, or the manual advanced configuration. This tutorial covers the latest Guided Configuration 16.1 offering an Easy Button template.
100+
There are many methods to deploy BIG-IP for this scenario including a template-driven Guided Configuration wizard, or the manual advanced configuration. This tutorial covers the Easy Button templates offered by the Guided Configuration 16.1 and upwards.
99101

100-
With the **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for secure hybrid access. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Multi-Factor Authentication (MFA), without management overhead of having to do on a per app basis.
102+
With the **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for secure hybrid access. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
101103

102104
For scenarios where the Guided Configuration lacks the flexibility to achieve a particular set of requirements, see the [Advanced deployment](#advanced-deployment) at the end of this tutorial.
103105

@@ -106,7 +108,9 @@ For scenarios where the Guided Configuration lacks the flexibility to achieve a
106108
107109
## Register Easy Button
108110

109-
Before a client or service can access Microsoft Graph, it must be trusted by the Microsoft identity platform by being registered with Azure AD. A BIG-IP must also be registered as a client in Azure AD, before the Easy Button wizard is trusted to access Microsoft Graph.
111+
Before a client or service can access Microsoft Graph, it must be trusted by the Microsoft identity platform.
112+
113+
The Easy Button client must also be registered as a client in Azure AD, before it is allowed to establish a trust relationship between each SAML SP instance of a BIG-IP published applications, and the IdP.
110114

111115
1. Sign-in to the [Azure AD portal](https://portal.azure.com) using an account with Application Administrative rights
112116

@@ -150,7 +154,7 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
150154

151155
## Configure Easy Button
152156

153-
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
157+
Next, step through the Easy Button configurations to federate and publish the EBS application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
154158

155159
1. From a browser, sign-in to the F5 BIG-IP management console
156160
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
@@ -355,7 +359,7 @@ Enabling SSO allows users to access BIG-IP published services without having to
355359
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-easy-button-ldap/sso-headers.png)
356360

357361
>[!NOTE]
358-
>The APM session variables defined within curly brackets are CASE sensitive. For example, if our queried LDAP attribute was returned as eventroles, then the above variable definition would fail to populate the eventrole header value. In case of any issues, troubleshoot using the session analysis steps to check how the APM has variables defined.
362+
>APM session variables defined within curly brackets are CASE sensitive. If you enter EventRoles when the Azure AD attribute name is being defined as eventroles, it will cause an attribute mapping failure.
359363
360364
### Session Management
361365

articles/active-directory/saas-apps/facebook-work-accounts-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8383
`https://work.facebook.com`
8484

8585
> [!NOTE]
86-
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Facebook Work Accounts Client support team](mailto:WorkplaceSupportPartnerships@fb.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
> These values are not real. Update these values with the actual Identifier and Reply URL. Engage the [Work Accounts team](https://www.workplace.com/help/work) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8787

8888
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
8989

@@ -151,7 +151,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
151151

152152
### Create Facebook Work Accounts test user
153153

154-
In this section, you create a user called Britta Simon in Facebook Work Accounts. Work with [Facebook Work Accounts support team](mailto:WorkplaceSupportPartnerships@fb.com) to add the users in the Facebook Work Accounts platform. Users must be created and activated before you use single sign-on.
154+
In this section, you create a user called Britta Simon in Facebook Work Accounts. Work with the [Work Accounts team](https://www.workplace.com/help/work) to add the users in the Facebook Work Accounts platform. Users must be created and activated before you use single sign-on.
155155

156156
## Test SSO
157157

articles/active-directory/saas-apps/salesforce-sandbox-provisioning-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ Before configuring and enabling the provisioning service, you need to decide whi
3535

3636
* When assigning a user to Salesforce Sandbox, you must select a valid user role. The "Default Access" role does not work for provisioning.
3737

38+
> [!NOTE]
39+
> The Salesforce Sandbox app will, by default, append a string to the username and email of the users provisioned. Usernames and Emails have to be unique across all of Salesforce so this is to prevent creating real user data in the sandbox which would prevent these users being provisioned to the production Salesforce environment
40+
3841
> [!NOTE]
3942
> This app imports custom roles from Salesforce Sandbox as part of the provisioning process, which the customer may want to select when assigning users.
4043
@@ -103,4 +106,4 @@ For more information on how to read the Azure AD provisioning logs, see [Reporti
103106

104107
* [Managing user account provisioning for Enterprise Apps](tutorial-list.md)
105108
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
106-
* [Configure Single Sign-on](./salesforce-sandbox-tutorial.md)
109+
* [Configure Single Sign-on](./salesforce-sandbox-tutorial.md)

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,22 +45,23 @@ Create a service principal for the Request Service API. The service API is the M
4545

4646
To create the service principal:
4747

48-
1. Run the following PowerShell commands. These commands install and import the `AzureAD` module. For more information, see [Install the Azure Az PowerShell module](/powershell/azure/install-az-ps#installation).
48+
1. Run the following PowerShell commands. These commands install and import the `Az` module. For more information, see [Install the Azure Az PowerShell module](/powershell/azure/install-az-ps#installation).
4949

5050
```powershell
51-
if ((Get-Module -ListAvailable -Name "AzureAD") -eq $null) { Install-Module "AzureAD" -Scope CurrentUser } Import-Module AzureAD
51+
if ((Get-Module -ListAvailable -Name "Az.Accounts") -eq $null) { Install-Module -Name "Az.Accounts" -Scope CurrentUser }
52+
if ((Get-Module -ListAvailable -Name "Az.Resources") -eq $null) { Install-Module "Az.Resources" -Scope CurrentUser }
5253
```
5354
5455
1. Run the following PowerShell command to connect to your Azure AD tenant. Replace \<*your-tenant-ID*> with your [Azure AD tenant ID](../../active-directory/fundamentals/active-directory-how-to-find-tenant.md).
5556
5657
```powershell
57-
Connect-AzureAD -TenantId <your-tenant-ID>
58+
Connect-AzAccount -TenantId <your-tenant-ID>
5859
```
5960
6061
1. Run the following command in the same PowerShell session. The `AppId` `bbb94529-53a3-4be5-a069-7eaf2712b826` refers to the Verifiable Credentials Microsoft service.
6162
6263
```powershell
63-
New-AzureADServicePrincipal -AppId "bbb94529-53a3-4be5-a069-7eaf2712b826" -DisplayName "Verifiable Credential Request Service"
64+
New-AzADServicePrincipal -ApplicationId "bbb94529-53a3-4be5-a069-7eaf2712b826" -DisplayName "Verifiable Credential Request Service"
6465
```
6566
6667
## Create a key vault

0 commit comments

Comments
 (0)