You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -275,7 +275,7 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
275
275
276
276
2. Choose the **Load Balancing Method** as *Round Robin*
277
277
278
-
3.Update**Pool Servers**. Select an existing node or specify an IP and port for the server hosting the header-based application
278
+
3.For**Pool Servers** select an existing node or specify an IP and port for the server hosting the header-based application
279
279
280
280

281
281
@@ -345,25 +345,26 @@ At that point, changes via the wizard UI are no longer possible, but all BIG-IP
345
345
346
346
## Troubleshooting
347
347
348
-
You can fail to access the SHA protected application due to any number of factors, including a misconfiguration.
349
-
350
-
BIG-IP logs are a great source of information for isolating all sorts of authentication & SSO issues. When troubleshooting you should increase the log verbosity level.
348
+
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
2. Select the row for your published application then **Edit > Access System Logs**
355
353
356
354
3. Select **Debug** from the SSO list then **OK**
357
355
358
-
Reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
356
+
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
357
+
358
+
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
359
359
360
360
1. Navigate to **Access > Overview > Access reports**
361
-
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
361
+
362
+
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
362
363
363
364
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
364
365
365
-
1. In which case you should head to **Access Policy > Overview > Active Sessions** and select the link for your active session
366
+
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
366
367
367
-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes
368
+
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
368
369
369
370
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).
0 commit comments