You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-header-advanced.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Learn more:
31
31
32
32
## Scenario description
33
33
34
-
For this scenario, there's a legacy application using HTTP authorization headers to control access to protected content. Ideally, application access is managed by Azure AD, however legacy lacks a modern authentication protocol. Modernization takes effort and time, while introducing downtime costs and risks. Instead, deploy a BIG-IP between the public internet and the internal application to gate inbound access to the application.
34
+
For this scenario, there's a legacy application using HTTP authorization headers to control access to protected content. Ideally, Azure AD manages application access, however legacy lacks a modern authentication protocol. Modernization takes effort and time, while introducing downtime costs and risks. Instead, deploy a BIG-IP between the public internet and the internal application to gate inbound access to the application.
35
35
36
36
A BIG-IP in front of the application enables overlay of the service with Azure AD preauthentication and header-based SSO. The configuration improves the application security posture.
37
37
@@ -40,11 +40,11 @@ A BIG-IP in front of the application enables overlay of the service with Azure A
40
40
The secure hybrid access solution for this scenario is made up of:
41
41
42
42
***Application** - BIG-IP published service to be protected by Azure AD SHA
43
-
***Azure AD** - Security Assertion Markup Language (SAML) identity provider (IdP) that verifies user credentials, Conditional Access, and SSO to the BIG-IP.
43
+
***Azure AD** - Security Assertion Markup Language (SAML) identity provider (IdP) that verifies user credentials, Conditional Access, and SSO to the BIG-IP
44
44
* With SSO, Azure AD provides the BIG-IP required session attributes, including user identifiers
45
45
***BIG-IP** - reverse-proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP, before header-based SSO to the back-end application
46
46
47
-
The folllowing diagram illustrates the user flow with Azure AD, BIG-IP, APM and an application.
47
+
The following diagram illustrates the user flow with Azure AD, BIG-IP, APM and an application.
48
48
49
49

50
50
@@ -78,14 +78,14 @@ For the scenario you need:
78
78
79
79
## BIG-IP configuration method
80
80
81
-
The following instructions are an advanced configuration method, a flexible way to implement SHA. Manually create BIG-IP configuration objects. Use this mehtod for scenarios not included in the Guided Configuration templates.
81
+
The following instructions are an advanced configuration method, a flexible way to implement SHA. Manually create BIG-IP configuration objects. Use this method for scenarios not included in the Guided Configuration templates.
82
82
83
83
>[!NOTE]
84
84
> Replace example strings or values with those from your environment.
85
85
86
86
## Add F5 BIG-IP from the Azure AD gallery
87
87
88
-
To implement SHA, the first step is to set up a SAML federation trust between BIG-IP APM and Azure AD. The trust establishes the integration for BIG-IP to hand off pre-authentication and Conditional Access to Azure AD, before granting access to the published service.
88
+
To implement SHA, the first step is to set up a SAML federation trust between BIG-IP APM and Azure AD. The trust establishes the integration for BIG-IP to hand off preauthentication and Conditional Access to Azure AD, before granting access to the published service.
89
89
90
90
Learn more: [What is Conditional Access?](../conditional-access/overview.md)
91
91
@@ -113,7 +113,7 @@ Learn more: [What is Conditional Access?](../conditional-access/overview.md)
113
113
>[!NOTE]
114
114
>In this configuration, the SAML flow operates in IdP mode: Azure AD issues the user a SAML assertion before being redirected to the BIG-IP service endpoint for the application. The BIG-IP APM supports IdP and SP modes.
115
115
116
-
9. For **Logout URI** enter the BIG-IP APM Single Logout (SLO) endpoint, pre-pended by the service host header. The SLO URI ensures user BIG-IP APM sessions end after Azure AD sign-out. For example, `https://mytravel.contoso.com/saml/sp/profile/redirect/slr`
116
+
9. For **Logout URI** enter the BIG-IP APM Single Logout (SLO) endpoint, prepended by the service host header. The SLO URI ensures user BIG-IP APM sessions end after Azure AD signout. For example, `https://mytravel.contoso.com/saml/sp/profile/redirect/slr`
117
117
118
118

119
119
@@ -161,7 +161,7 @@ By default, Azure AD issues tokens to users granted access to an application.
161
161
4. Select **Select**.
162
162
5. Select **Assign**.
163
163
164
-
This completes the Azure AD SAML federation trust. Next, set up BIG-IP APM to publish the web application, configured with properties to complete SAML preauthentication trust.
164
+
Azure AD SAML federation trust is complete. Next, set up BIG-IP APM to publish the web application, configured with properties to complete SAML preauthentication trust.
165
165
166
166
## Advanced configuration
167
167
@@ -235,8 +235,8 @@ Create an APM SSO object.
235
235
11. For **Header Name**, enter **upn**.
236
236
12. For **Header Value**, enter **%{session.saml.last.identity}**.
237
237
13. For **Header Name**, enter **employeeid**.
238
-
14.Fpr**Header Value**, enter **%{session.saml.last.attr.name.employeeid}**.
239
-
15.Fpr**Header Name**, enter **group\_authz**.
238
+
14.For**Header Value**, enter **%{session.saml.last.attr.name.employeeid}**.
239
+
15.For**Header Name**, enter **group\_authz**.
240
240
16. For **Header Value**, enter **%{session.saml.last.attr.name.`http://schemas.microsoft.com/ws/2008/06/identity/claims/groups`}**.
241
241
242
242
>[!Note]
@@ -287,7 +287,7 @@ The following instructions are optional. With a LogonID_Mapping configuration, t
287
287
288
288

289
289
290
-
2. In the pop-up select **Assignment** > **Variable Assign** > **Add Item**.
290
+
2. In the pop-up, select **Assignment** > **Variable Assign** > **Add Item**.
291
291
292
292

293
293
@@ -347,7 +347,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
347
347
348
348

349
349
350
-
9. For **Access Policy**, select the **Access Profile** created earlier. This binds the Azure AD SAML preauthentication profile and headers SSO policy to the virtual server.
350
+
9. For **Access Policy**, select the **Access Profile** created earlier. This action binds the Azure AD SAML preauthentication profile and headers SSO policy to the virtual server.
351
351
10. For **Per-Request Policy**, select **SSO_Headers**.
352
352
353
353

@@ -359,13 +359,13 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
359
359
360
360
## Session management
361
361
362
-
Use the BIG-IPs session management setting to define the conditions for user session termination or continuation. Create policy with **Access Policy** > **Access Profiles**. Sselect an application from the list.
362
+
Use the BIG-IPs session management setting to define the conditions for user session termination or continuation. Create policy with **Access Policy** > **Access Profiles**. Select an application from the list.
363
363
364
-
Regarding SLO functionality, a SLO URI in Azure AD ensures an IdP initiated sign-out from the MyApps portal terminates the session between the client and the BIG-IP APM. The imported application federation metadata.xml provides the APM with the Azure AD SAML sign-out endpoint, for SP initiated sign-outs. Therefore, enable the APM to know when a user signs out.
364
+
Regarding SLO functionality, a SLO URI in Azure AD ensures an IdP initiated signout from the MyApps portal terminates the session between the client and the BIG-IP APM. The imported application federation metadata.xml provides the APM with the Azure AD SAML sign-out endpoint, for SP initiated sign out. Therefore, enable the APM to know when a user signs out.
365
365
366
-
If there's no BIG-IP web portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. The application session can be reinstated through SSO. Therefore, SP-initiated sign-out needs careful consideration.
366
+
If there's no BIG-IP web portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. The application session can be reinstated through SSO. Therefore, SP-initiated signout needs careful consideration.
367
367
368
-
To ensure sessions terminate securely, add an SLO function to your application **Sign out** button. Enable it to redirect the client to the Azure AD SAML sign-out endpoint. For the SAML sign-out endpoint for your tenant, go to **App Registrations** > **Endpoints**.
368
+
To ensure sessions terminate securely, add an SLO function to your application **Sign out** button. Enable it to redirect the client to the Azure AD SAML sign-out endpoint. For the SAML signout endpoint for your tenant, go to **App Registrations** > **Endpoints**.
369
369
370
370
If you can't change the app, enable the BIG-IP to listen for the app sign-out call and trigger SLO. To learn more:
371
371
@@ -382,7 +382,7 @@ If you can't change the app, enable the BIG-IP to listen for the app sign-out ca
382
382
383
383
1. As a user, select the application external URL, or in the MyApps portal select the application icon.
384
384
2. Authenticate to Azure AD.
385
-
3. You are redirected to the BIG-IP virtual server for the app and signed in with SSO.
385
+
3. You're redirected to the BIG-IP virtual server for the app and signed in with SSO.
386
386
4. The injected header output appears by the header-based application.
387
387
388
388

0 commit comments