You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,9 @@ Having a BIG-IP in front of the application enables us to overlay the service wi
42
42
43
43
The SHA solution for this scenario is made up of:
44
44
45
-
**Application:** BIG-IP published service to be protected by and Azure AD SHA.
45
+
**Application:** BIG-IP published service to be protected by Azure AD SHA.
46
46
47
-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required attributes including a user identifier.
47
+
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
48
48
49
49
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
50
50
@@ -56,7 +56,7 @@ SHA for this scenario supports both SP and IdP initiated flows. The following im
56
56
| - |----|
57
57
| 1| User connects to application endpoint (BIG-IP) |
58
58
| 2| BIG-IP APM access policy redirects user to Azure AD (SAML IdP) |
59
-
| 3| Azure AD pre-authenticates user and applies any enforced CA policies |
59
+
| 3| Azure AD pre-authenticates user and applies any enforced Conditional Access policies |
60
60
| 4| User is redirected to BIG-IP (SAML SP) and SSO is performed using issued SAML token |
61
61
| 5| BIG-IP injects Azure AD attributes as headers in request to the application |
62
62
| 6| Application authorizes request and returns payload |
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
85
85
86
-
*A[SSL certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default certificates while testing
86
+
*An[SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
87
87
88
88
* An existing header-based application or [setup a simple IIS header app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
89
89
90
90
## BIG-IP configuration methods
91
91
92
-
There are many methods to deploy BIG-IP for this scenario including a template-driven Guided Configuration, or an advanced configuration. This tutorial covers the Easy Button templates offered by the Guided Configuration 16.1 and upwards.
93
-
94
-
With the **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management of applications is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
92
+
There are many methods to configure BIG-IP for this scenario, including two template-based options and an advanced configuration. This tutorial covers the latest Guided Configuration 16.1 offering an Easy button template. With the Easy Button, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures that applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
95
93
96
94
> [!NOTE]
97
95
> All example strings or values referenced throughout this guide should be replaced with those for your actual environment.
@@ -162,7 +160,7 @@ Some of these are global settings so can be re-used for publishing more applicat
162
160
163
161
The Service Provider settings define the SAML SP properties for the APM instance representing the application protected through SHA.
164
162
165
-
1. Enter **Host**. This is the public FQDN of the application being secured. You’ll need a corresponding DNS record for clients to resolve this address, but using a localhost record is fine during testing
163
+
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
166
164
167
165
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
168
166
@@ -259,7 +257,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
259
257
260
258
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for clients requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
261
259
262
-
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP.
260
+
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
0 commit comments