Skip to content

Commit 1c699b9

Browse files
authored
Consistency updates
1 parent f6358c4 commit 1c699b9

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
275275

276276
2. Choose the **Load Balancing Method** as *Round Robin*
277277

278-
3. Update **Pool Servers**. Select an existing node or specify an IP and port for the server hosting the header-based application
278+
3. For **Pool Servers** select an existing node or specify an IP and port for the server hosting the header-based application
279279

280280
![Screenshot for Application pool](./media/f5-big-ip-oracle/application-pool.png)
281281

@@ -345,25 +345,26 @@ At that point, changes via the wizard UI are no longer possible, but all BIG-IP
345345
346346
## Troubleshooting
347347

348-
You can fail to access the SHA protected application due to any number of factors, including a misconfiguration.
349-
350-
BIG-IP logs are a great source of information for isolating all sorts of authentication & SSO issues. When troubleshooting you should increase the log verbosity level.
348+
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
351349

352350
1. Navigate to **Access Policy > Overview > Event Logs > Settings**
353351

354352
2. Select the row for your published application then **Edit > Access System Logs**
355353

356354
3. Select **Debug** from the SSO list then **OK**
357355

358-
Reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
356+
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
357+
358+
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
359359

360360
1. Navigate to **Access > Overview > Access reports**
361-
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
361+
362+
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
362363

363364
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
364365

365-
1. In which case you should head to **Access Policy > Overview > Active Sessions** and select the link for your active session
366+
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
366367

367-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes
368+
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
368369

369370
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).

0 commit comments

Comments
 (0)