You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this article, you'll learn how to implement Secure Hybrid Access (SHA) with single sign-on (SSO) to Kerberos applications by using F5's BIG-IP advanced configuration.
19
19
20
-
Integrating a BIG-IP with Azure AD provides many benefits, including:
20
+
Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
21
21
22
-
* Improved Zero Trust governance through Azure Active Directory (Azure AD) pre-authentication and authorization.
22
+
* Improved Zero Trust governance through Azure AD pre-authentication and authorization.
23
23
24
24
* Full SSO between Azure AD and BIG-IP published services.
25
25
@@ -34,15 +34,15 @@ For this scenario, you'll configure a critical line-of-business application for
34
34
35
35
For you to integrate the application directly with Azure AD, it would need to support some form of federation-based protocol, such as Security Assertion Markup Language (SAML). But because modernizing the application introduces the risk of potential downtime, there are other options.
36
36
37
-
While you're using Kerberos Constrained Delegation (KCD) for SSO, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) to access the application remotely. In this arrangement, you can achieve the protocol transitioning required to bridge the legacy application to the modern identity control plane.
37
+
While you're using Kerberos Constrained Delegation (KCD) for SSO, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) to access the application remotely. In this arrangement, you can achieve the protocol transitioning that's required to bridge the legacy application to the modern identity control plane.
38
38
39
39
Another approach is to use an F5 BIG-IP Application Delivery Controller. This approach enables overlay of the application with Azure AD pre-authentication and KCD SSO. It significantly improves the overall Zero Trust posture of the application.
40
40
41
41
## Scenario architecture
42
42
43
43
The SHA solution for this scenario consists of the following elements:
44
44
45
-
-**Application**: Back-end Kerberos-based service that's externally published by the BIG-IP and is protected by SHA.
45
+
-**Application**: Back-end Kerberos-based service that's externally published by BIG-IP and protected by SHA.
46
46
47
47
-**BIG-IP**: Reverse proxy functionality that enables publishing back-end applications. The Access Policy Manager (APM) then overlays published applications with SAML service provider (SP) and SSO functionality.
48
48
@@ -99,7 +99,7 @@ There are many methods to configure BIG-IP for this scenario, including two temp
99
99
100
100
## Register F5 BIG-IP in Azure AD
101
101
102
-
Before BIG-IP can hand off pre-authentication to Azure AD, it must be registered in your tenant. This is the first step in establishing SSO between both entities. It's no different from making any IDP aware of a SAML relying party. In this case, the app that you create from the F5 BIG-IP gallery template is the relying party that represents the SAML SP for the BIG-IP published application.
102
+
Before BIG-IP can hand off pre-authentication to Azure AD, it must be registered in your tenant. This is the first step in establishing SSO between both entities. It's no different from making any IdP aware of a SAML relying party. In this case, the app that you create from the F5 BIG-IP gallery template is the relying party that represents the SAML SP for the BIG-IP published application.
103
103
104
104
1. Sign in to the [Azure AD portal](https://portal.azure.com) by using an account with Application Administrator permissions.
105
105
@@ -138,7 +138,7 @@ Next, configure the BIG-IP registration to fulfill SAML tokens that the BIG-IP A
138
138

139
139
140
140
> [!NOTE]
141
-
> From TMOS v16, the SAML SLO endpoint has changed to */saml/sp/profile/redirect/slo*.
141
+
> From TMOS v16, the SAML SLO endpoint has changed to **/saml/sp/profile/redirect/slo**.
142
142
143
143
4. Select **Save** before closing the SAML configuration pane and skip the SSO test prompt.
144
144
@@ -152,7 +152,7 @@ SAML signing certificates that Azure AD creates have a lifespan of three years.
152
152
153
153
## Assign users and groups
154
154
155
-
By default, Azure AD will issue tokens only for users who have been granted access to an application. To provide specific users and groups access to the application:
155
+
By default, Azure AD will issue tokens only for users who have been granted access to an application. To grant specific users and groups access to the application:
156
156
157
157
1. On the **F5 BIG-IP application's overview** pane, select **Assign Users and groups**.
158
158
@@ -172,7 +172,7 @@ For the scenario in this article, the application is hosted on server **APP-VM-0
172
172
173
173
Because BIG-IP doesn't support group managed service accounts, create a standard user account to use as the APM service account:
174
174
175
-
1. Enter the following PowerShell command. Replace the **UserPrincipalName** and **SamAccountName** values with those for your environment.
175
+
1. Enter the following PowerShell command. Replace the `UserPrincipalName` and `SamAccountName` values with those for your environment.
@@ -193,7 +193,7 @@ Because BIG-IP doesn't support group managed service accounts, create a standard
193
193
194
194
5. You can use any SPN that you see defined against a web application's service account. But in the interest of security, it's best to use a dedicated SPN that matches the host header of the application.
195
195
196
-
For example, because the web application host header in this example is *myexpenses.contoso.com*, you would add `HTTP/myexpenses.contoso.com` to the application's service account object in Active Directory:
196
+
For example, because the web application host header in this example is **myexpenses.contoso.com**, you would add `HTTP/myexpenses.contoso.com` to the application's service account object in Active Directory:
@@ -217,7 +217,7 @@ If you prefer, you can complete these tasks through the **Active Directory Users
217
217
218
218
### Configure BIG-IP and the target application in different domains
219
219
220
-
Starting with Windows Server 2012, cross-domain KCD uses resource-based constrained delegation. The constraints for a service have been transferred from the domain administrator to the service administrator. This delegation allows the back-end service administrator to allow or deny SSO. It also introduces a different approach at configuration delegation, which is possible only when you use either PowerShell or ADSIEdit.
220
+
Starting with Windows Server 2012, cross-domain KCD uses resource-based constrained delegation. The constraints for a service have been transferred from the domain administrator to the service administrator. This delegation allows the back-end service administrator to allow or deny SSO. It also introduces a different approach at configuration delegation, which is possible only when you use either PowerShell or ADSI Edit.
221
221
222
222
You can use the `PrincipalsAllowedToDelegateToAccount` property of the application's service account (computer or dedicated service account) to grant delegation from BIG-IP. For this scenario, use the following PowerShell command on a domain controller (Windows Server 2012 R2 or later) within the same domain as the application.
223
223
@@ -241,7 +241,7 @@ Now you can proceed with setting up the BIG-IP configurations.
241
241
242
242
### Configure SAML service provider settings
243
243
244
-
These settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication:
244
+
SAML service provider settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
245
245
246
246
1. From a browser, sign in to the F5 BIG-IP management console.
247
247
@@ -259,9 +259,9 @@ These settings define the SAML SP properties that the APM will use for overlayin
259
259
260
260
### Configure an external IdP connector
261
261
262
-
A SAML IdP connector defines the settings required for the BIG-IP APM to trust Azure AD as its SAML IdP. These settings will map the SAML SP to a SAML IdP, establishing the federation trust between the APM and Azure AD:
262
+
A SAML IdP connector defines the settings that are required for the BIG-IP APM to trust Azure AD as its SAML IdP. These settings will map the SAML SP to a SAML IdP, establishing the federation trust between the APM and Azure AD. To configure the connector:
263
263
264
-
1. Scroll down to select the new SAML SP object, and then select **Bind/Unbind IdP Connectors**
264
+
1. Scroll down to select the new SAML SP object, and then select **Bind/Unbind IdP Connectors**.
265
265
266
266

267
267
@@ -354,7 +354,7 @@ An *access profile* binds many APM elements that manage access to BIG-IP virtual
354
354
355
355
### Configure attribute mappings
356
356
357
-
Although it's optional, adding a *LogonID_Mapping* configuration enables the BIG-IP active sessions list to display the UPN of the logged-in user instead of a session number. This information is useful when you're analyzing logs or troubleshooting.
357
+
Although it's optional, adding a **LogonID_Mapping** configuration enables the BIG-IP active sessions list to display the UPN of the logged-in user instead of a session number. This information is useful when you're analyzing logs or troubleshooting.
358
358
359
359
1. Select the **+** symbol for the **SAML Auth Successful** branch.
360
360
@@ -364,7 +364,7 @@ Although it's optional, adding a *LogonID_Mapping* configuration enables the BIG
364
364
365
365
3. Enter **Name**.
366
366
367
-
4.In the **Variable Assign** pane, select **Add new entry** > **change**. The following example shows **LogonID_Mapping** in the **Name** box.
367
+
4.On the **Variable Assign** pane, select **Add new entry** > **change**. The following example shows **LogonID_Mapping** in the **Name** box.
368
368
369
369

370
370
@@ -436,7 +436,7 @@ BIG-IP's session management settings define the conditions under which user sess
436
436
437
437
If you've defined a **Single Logout URI** value in Azure AD, it will ensure that an IdP-initiated sign-out from the MyApps portal also ends the session between the client and the BIG-IP APM. The imported application's federation metadata XML file provides the APM with the Azure AD SAML logout endpoint for SP-initiated sign-outs. But for this to be truly effective, the APM needs to know exactly when a user signs out.
438
438
439
-
Consider a scenario where a BIG-IP web portal is not used. The user has no way of instructing the APM to sign out. Even if the user signs out of the application itself, BIG-IP is technically oblivious to this, so the application session could easily be reinstated through SSO. For this reason, SP-initiated sign-out needs careful consideration to ensure that sessions are securely terminated when no longer required.
439
+
Consider a scenario where a BIG-IP web portal is not used. The user has no way of instructing the APM to sign out. Even if the user signs out of the application itself, BIG-IP is technically oblivious to this, so the application session could easily be reinstated through SSO. For this reason, SP-initiated sign-out needs careful consideration to ensure that sessions are securely terminated when they're no longer required.
440
440
441
441
One way to achieve this is by adding an SLO function to your application's sign-out button. This function can redirect your client to the Azure AD SAML sign-out endpoint. You can find this SAML sign-out endpoint at **App Registrations** > **Endpoints**.
442
442
@@ -448,7 +448,7 @@ For more information, see the F5 articles [Configuring automatic session termina
448
448
449
449
Your application should now be published and accessible via SHA, either directly via its URL or through Microsoft's application portals. The application should also be visible as a target resource in [Azure AD Conditional Access](../conditional-access/concept-conditional-access-policies.md).
450
450
451
-
For increased security, organizations that use this pattern can also consider blocking all direct access to the application, forcing a strict path through BIG-IP.
451
+
For increased security, organizations that use this pattern can also consider blocking all direct access to the application. Blocking all direct access forces a strict path through BIG-IP.
452
452
453
453
## Next steps
454
454
@@ -473,7 +473,7 @@ There can be many reasons for failure to access a SHA-protected application, inc
473
473
> [!NOTE]
474
474
> To validate that an IIS application is configured appropriately for KCD, see [Troubleshoot Kerberos constrained delegation configurations for Application Proxy](../app-proxy/application-proxy-back-end-kerberos-constrained-delegation-how-to.md). F5's article on [how the APM handles Kerberos SSO](https://techdocs.f5.com/en-us/bigip-15-1-0/big-ip-access-policy-manager-single-sign-on-concepts-configuration/kerberos-single-sign-on-method.html) is also a valuable resource.
475
475
476
-
### Authentication and SSO issues
476
+
### Authentication and SSO problems
477
477
478
478
BIG-IP logs are a reliable source of information. To increase the log verbosity level:
479
479
@@ -495,7 +495,7 @@ If you don't see a BIG-IP error page, the problem is probably more related to th
495
495
496
496
2. Select the link for your active session. The **View Variables** link in this location might also help you determine root-cause KCD problems, particularly if the BIG-IP APM fails to get the right user and domain identifiers.
497
497
498
-
For help with diagnosing KCD-related issues, see the F5 BIG-IP deployment guide [Configuring Kerberos Constrained Delegation](https://www.f5.com/pdf/deployment-guides/kerberos-constrained-delegation-dg.pdf).
498
+
For help with diagnosing KCD-related problems, see the F5 BIG-IP deployment guide [Configuring Kerberos Constrained Delegation](https://www.f5.com/pdf/deployment-guides/kerberos-constrained-delegation-dg.pdf).
0 commit comments