Skip to content

Commit 1207dce

Browse files
authored
Merge pull request #189818 from Rainier-MSFT/patch-131
Consistency updates
2 parents 16a07f9 + 9adfef6 commit 1207dce

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ Having a BIG-IP in front of the application enables us to overlay the service wi
4242

4343
The SHA solution for this scenario is made up of:
4444

45-
**Application:** BIG-IP published service to be protected by and Azure AD SHA.
45+
**Application:** BIG-IP published service to be protected by Azure AD SHA.
4646

47-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required attributes including a user identifier.
47+
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
4848

4949
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
5050

@@ -56,7 +56,7 @@ SHA for this scenario supports both SP and IdP initiated flows. The following im
5656
| - |----|
5757
| 1| User connects to application endpoint (BIG-IP) |
5858
| 2| BIG-IP APM access policy redirects user to Azure AD (SAML IdP) |
59-
| 3| Azure AD pre-authenticates user and applies any enforced CA policies |
59+
| 3| Azure AD pre-authenticates user and applies any enforced Conditional Access policies |
6060
| 4| User is redirected to BIG-IP (SAML SP) and SSO is performed using issued SAML token |
6161
| 5| BIG-IP injects Azure AD attributes as headers in request to the application |
6262
| 6| Application authorizes request and returns payload |
@@ -83,15 +83,13 @@ Prior BIG-IP experience isn’t necessary, but you’ll need:
8383

8484
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
8585

86-
* A [SSL certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default certificates while testing
86+
* An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
8787

8888
* An existing header-based application or [setup a simple IIS header app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
8989

9090
## BIG-IP configuration methods
9191

92-
There are many methods to deploy BIG-IP for this scenario including a template-driven Guided Configuration, or an advanced configuration. This tutorial covers the Easy Button templates offered by the Guided Configuration 16.1 and upwards.
93-
94-
With the **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management of applications is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
92+
There are many methods to configure BIG-IP for this scenario, including two template-based options and an advanced configuration. This tutorial covers the latest Guided Configuration 16.1 offering an Easy button template. With the Easy Button, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures that applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
9593

9694
> [!NOTE]
9795
> All example strings or values referenced throughout this guide should be replaced with those for your actual environment.
@@ -162,7 +160,7 @@ Some of these are global settings so can be re-used for publishing more applicat
162160

163161
The Service Provider settings define the SAML SP properties for the APM instance representing the application protected through SHA.
164162

165-
1. Enter **Host**. This is the public FQDN of the application being secured. You’ll need a corresponding DNS record for clients to resolve this address, but using a localhost record is fine during testing
163+
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
166164

167165
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
168166

@@ -259,7 +257,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
259257

260258
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for clients requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
261259

262-
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP.
260+
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
263261

264262
2. Enter **Service Port** as *443* for HTTPS
265263

0 commit comments

Comments
 (0)