Skip to content

Commit 2e59743

Browse files
authored
Consistency tweaks & updates
1 parent bbfb99a commit 2e59743

File tree

1 file changed

+24
-22
lines changed

1 file changed

+24
-22
lines changed

articles/active-directory/manage-apps/f5-aad-password-less-vpn.md

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -10,28 +10,28 @@ ms.subservice: app-mgmt
1010
ms.topic: how-to
1111
ms.workload: identity
1212
ms.date: 10/12/2020
13-
ms.author: davidmu
13+
ms.author: v-nisba
1414
ms.collection: M365-identity-device-management
15-
ms.reviewer: miccohen
15+
ms.reviewer: v-nisba
1616
---
1717

18-
# Configure F5 BIG-IP SSL-VPN solution in Azure AD
18+
# Tutorial: Configure F5 BIG-IP SSL-VPN for Azure AD SSO
1919

20-
In this tutorial, learn how to configure F5’s BIG-IP based Secure socket layer Virtual private network (SSL-VPN) solution with Azure Active Directory (AD) for Secure Hybrid Access (SHA).
20+
In this tutorial, learn how to integrate F5’s BIG-IP based Secure socket layer Virtual Private Network (SSL-VPN) with Azure Active Directory (AD) for Secure Hybrid Access (SHA).
2121

22-
Configuring a BIG-IP SSL-VPN with Azure AD provides [many key benefits](f5-aad-integration.md), including:
23-
24-
- Improved Zero trust governance through [Azure AD pre-authentication and authorization](../../app-service/overview-authentication-authorization.md)
22+
Enabling a BIG-IP SSL-VPN for Azure AD single sign-on (SSO) provides many benefits, including:
2523

24+
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2625
- [Password-less authentication to the VPN service](https://www.microsoft.com/security/business/identity/passwordless)
26+
- Manage Identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/en-us/features/azure-portal/)
2727

28-
- Manage Identities and access from a single control plane - The [Azure portal](https://portal.azure.com/#home)
28+
To learn about all of the benefits, see [Integrate F5 BIG-IP with Azure Active Directory](./f5-aad-integration.md) and [What is single sign-on in Azure Active Directory?](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

30-
Despite these great value adds, the classic VPN does however remain predicated on the notion of a network perimeter, where trusted is on the inside and untrusted the outside. This model is no longer effective in achieving a true Zero Trust posture, since corporate assets are no longer confined to the walls of an enterprise data center, but rather across multi-cloud environments with no fixed boundaries. For this reason, we encourage our customers to consider moving to a more Identity driven approach at managing [access on a per application basis](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md).
30+
Despite these great value adds, classic VPNs do however remain network orientated, often providing little to zero fine grained access to corporate applications. For this reason, we encourage moving to a more Identity centric approach at achieving Zero Trust [access on a per application basis](/fundamentals/five-steps-to-full-application-integration-with-azure-ad).
3131

3232
## Scenario description
3333

34-
In this scenario, the BIG-IP APM instance of the SSL-VPN service will be configured as a SAML Service Provider (SP) and Azure AD becomes the trusted SAML IDP, providing pre-authentication. Single sign-on (SSO) from Azure AD is then provided through claims-based authentication to the BIG-IP APM, providing a seamless VPN access experience.
34+
In this scenario, the BIG-IP APM instance of the SSL-VPN service will be configured as a SAML Service Provider (SP) and Azure AD becomes the trusted SAML IDP. SSO from Azure AD is then provided through claims-based authentication to the BIG-IP APM, providing a seamless VPN access experience.
3535

3636
![Image shows ssl-vpn architecture](media/f5-sso-vpn/ssl-vpn-architecture.png)
3737

@@ -54,7 +54,7 @@ Prior experience or knowledge of F5 BIG-IP isn't necessary, however, you'll need
5454

5555
- The BIG-IP should be provisioned with the necessary SSL certificates for publishing services over HTTPS.
5656

57-
Familiarizing yourself with [F5 BIG-IP terminology](https://www.f5.com/services/resources/glossary) will also help understand the various components that are referenced throughout the tutorial.
57+
Familiarizing yourself with [F5 BIG-IP terminology](https://www.f5.com/services/resources/glossary) will also help understand the various components referenced throughout the tutorial.
5858

5959
>[!NOTE]
6060
>Azure is constantly evolving so don’t be surprised if you find any nuances between the instructions in this guide and what you see in the Azure portal. Screenshots are from BIG-IP v15, however, remain relatively similar from v13.1.
@@ -89,7 +89,7 @@ Setting up a SAML federation trust between the BIG-IP allows the Azure AD BIG-IP
8989

9090
- For the Logout URL enter the BIG-IP APM Single logout (SLO) endpoint pre-pended by the host header of the service being published. For example, `https://ssl-vpn.contoso.com/saml/sp/profile/redirect/slr`
9191

92-
Providing an SLO URL ensures a user session is terminated at both ends, the BIG-IP and Azure AD, after the user signs out. BIG-IP APM also provides an [option](https://support.f5.com/csp/article/K12056) for terminating all sessions when calling a specific application URL.
92+
Providing an SLO URL ensures a user session is terminated at both ends, the BIG-IP and Azure AD, after the user signs out. BIG-IP APM also provides an [option](https://support.f5.com/csp/article/K12056) for terminating all sessions when calling a specific application URL.
9393

9494
![Image shows basic saml configuration](media/f5-sso-vpn/basic-saml-configuration.png).
9595

@@ -136,7 +136,7 @@ The following section creates the BIG-IP SAML service provider and corresponding
136136

137137
![Image shows creating new SAML SP service](media/f5-sso-vpn/create-new-saml-sp.png)
138138

139-
SP **Name** settings are only required if the entity ID isn't an exact match of the hostname portion of the published URL, or if it isn’t in regular hostname-based URL format. Provide the external scheme and hostname of the application being published if entity ID is `urn:ssl-vpn:contosoonline`.
139+
SP **Name** settings are only required if the entity ID isn't an exact match of the hostname portion of the published URL, or if it isn’t in regular hostname-based URL format. Provide the external scheme and hostname of the application being published if entity ID is `urn:ssl-vpn:contosoonline`.
140140

141141
3. Scroll down to select the new **SAML SP object** and select **Bind/UnBind IDP Connectors**.
142142

@@ -292,15 +292,6 @@ With all the settings in place, the APM now requires a front-end virtual server
292292

293293
8. Your SSL-VPN service is now published and accessible via SHA, either directly via its URL or through Microsoft’s application portals.
294294

295-
## Additional resources
296-
297-
- [The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
298-
299-
- [What is Conditional Access?](../conditional-access/overview.md)
300-
301-
- [Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
302-
303-
- [Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)
304295

305296
## Next steps
306297

@@ -310,3 +301,14 @@ Open a browser on a remote Windows client and browse to the URL of the **BIG-IP
310301

311302
Selecting the VPN tile will install the BIG-IP Edge client and establish a VPN connection configured for SHA.
312303
The F5 VPN application should also be visible as a target resource in Azure AD Conditional Access. See our [guidance](../conditional-access/concept-conditional-access-policies.md) for building Conditional Access policies and also enabling users for Azure AD [password-less authentication](https://www.microsoft.com/security/business/identity/passwordless).
304+
305+
306+
## Additional resources
307+
308+
- [The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
309+
310+
- [What is Conditional Access?](../conditional-access/overview.md)
311+
312+
- [Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
313+
314+
- [Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)

0 commit comments

Comments
 (0)