You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. For **Pool Servers**, select a node, or select an IP address and port for the server hosting the header-based application.
277
277
278
-

278
+

279
279
280
280
> [!NOTE]
281
281
> The Microsoft back-end application is on HTTP Port 80. If you select HTTPS, use **443**.
@@ -302,46 +302,60 @@ Use BIG-IP session management settings to define conditions for user sessions te
302
302
303
303
To learn more, go to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
304
304
305
-
Single log-out (SLO) ensures IdP, BIG-IP, and user agent sessions terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the sign out URL, with the APM SLO endpoint. IdP-initiated sign out from My Apps terminate BIG-IP and client sessions.
305
+
Single log-out (SLO) ensures IdP, BIG-IP, and user agent sessions terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the sign out URL, with the APM SLO endpoint. IdP-initiated sign out from My Apps terminates BIG-IP and client sessions.
306
306
307
307
Learn more: see, [My Apps](https://myapplications.microsoft.com/)
308
308
309
-
Along with this the SAML federation metadata for the published application is also imported from your tenant, providing the APM with the SAML logout endpoint for Azure AD. This ensures SPinitiated sign outs terminate the session between a client and Azure AD. But for this to be truly effective, the APM needs to know exactly when a user signs-out of the application.
309
+
The SAML federation metadata for the published application is imported from your tenant. The import provides the APM with the SAML sign out endpoint for Azure AD. This ensures SP-initiated sign out terminates client and Azure AD sessions. Ensure the APM knows when user sign out occurs.
310
310
311
-
If the BIG-IP webtop portal is used to access published applications then a sign-out from there would be processed by the APM to also call the Azure AD sign-out endpoint. But consider a scenario where the BIG-IP webtop portal isn’t used, then the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this. So for this reason, SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required. One way of achieving this would be to add an SLO function to your applications sign out button, so that it can redirect your client to either the Azure AD SAML or BIG-IP sign-out endpoint. The URL for SAML sign-out endpoint for your tenant can be found in**App Registrations > Endpoints**.
311
+
If the BIG-IP webtop portal accesses published applications, then th eAPM processes the sign out to call the Azure AD signout endpoint. If the BIG-IP webtop portal isn’t used, users can't instruct the APM to sign out. If users sign out of the application, the BIG-IP is oblivious. Thus, ensure SP-initiated signout securely terminates sessions. You can add an SLO function to an application **Sign out** button, Then, clients are redirected to the Azure AD SAML or BIG-IP signout endpoint. To locate the SAML signout endpoint URL for your tenant, go to**App Registrations > Endpoints**.
312
312
313
-
If making a change to the app is a no go, then consider having the BIG-IP listen for the application's sign-out call, and upon detecting the request have it trigger SLO. Refer to our [Oracle PeopleSoft SLO guidance](./f5-big-ip-oracle-peoplesoft-easy-button.md#peoplesoft-single-logout) for using BIG-IP irules to achieve this. More details on using BIG-IP iRules to achieve this is available in the F5 knowledge article [Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145) and [Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
313
+
If you can't change the app, enable the BIG-IP to listen for the application signout call and trigger SLO.
314
314
315
-
## Summary
315
+
Learn more:
316
316
317
-
This last step provides a breakdown of your configurations. Select **Deploy** to commit all settings and verify that the application now exists in your tenants list of ‘Enterprise applications.
*[K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145)
320
+
*[K12056: Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
318
321
319
-
Your application should now be published and accessible via SHA, either directly via its URL or through Microsoft’s application portals.
322
+
## Deploy
320
323
321
-
## Next steps
324
+
Deployment provides a breakdown of your configurations.
322
325
323
-
From a browser, **connect** to the application’s external URL or select the **application’s icon** in the [Microsoft MyApps portal](https://myapplications.microsoft.com/). After authenticating against Azure AD, you’ll be redirected to the BIG-IP virtual server for the application and automatically signed in through SSO.
326
+
1. To commit settings, select **Deploy**.
327
+
2. Verify the application in in your tenant list of Enterprise applications.
328
+
3. The application is published and accessible via SHA, with its URL, or on Microsoft application portals.
324
329
325
-
This shows the output of the injected headers displayed by our headers-based application.
330
+
## Test
326
331
327
-

332
+
1. From a browser, connect to the application external URL or select the application icon on [My Apps](https://myapplications.microsoft.com/).
333
+
2. Authenticate to Azure AD.
334
+
3. You’re redirected to the BIG-IP virtual server for the application and signed in with SSO.
328
335
329
-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
336
+
The following screenshot is injected headers output from the header-based application.
337
+
338
+

339
+
340
+
> [!NOTE]
341
+
> You can block direct access to the application, thereby enforcing a path through the BIG-IP.
330
342
331
343
## Advanced deployment
332
344
333
-
There may be cases where the Guided Configuration templates lacks the flexibility to achieve more specific requirements. For those scenarios, see [Advanced Configuration for headers-based SSO](./f5-big-ip-header-advanced.md).
345
+
For some scenarios, Guided Configuration templates lack flexibility.
334
346
335
-
Alternatively, the BIG-IP gives you the option to disable **Guided Configuration’s strict management mode**. This allows you to manually tweak your configurations, even though bulk of your configurations are automated through the wizard-based templates.
You can navigate to **Access > Guided Configuration** and select the **small padlock icon** on the far right of the row for your applications’ configs.
349
+
In BIG-IP, you can disable the Guided Configuration strict management mode. Then, manually change configurations, however most configurations are automated with wizard templates.
338
350
339
-

351
+
1. To disable strict mode, navigate to **Access > Guided Configuration**.
352
+
2. On the row for the application configuration, select the **padlock** icon.
353
+
3. BIG-IP objects associated with the published instance of the application are unlocked for management. Changes with the wizard are no longer possible.
340
354
341
-
At that point, changes via the wizard UI are no longer possible, but all BIG-IP objects associated with the published instance of the application will be unlocked for direct management.
355
+

342
356
343
-
> [!NOTE]
344
-
> Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, therefore we recommend the advanced configuration method for production services.
357
+
> [!NOTE]
358
+
> If you ree-enable strict mode and deploy a configuration, the action overwrites settings not in the Guided Configuration. We recommend the advanced configuration for production services.
0 commit comments