You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-aad-password-less-vpn.md
+24-22Lines changed: 24 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,28 +10,28 @@ ms.subservice: app-mgmt
10
10
ms.topic: how-to
11
11
ms.workload: identity
12
12
ms.date: 10/12/2020
13
-
ms.author: davidmu
13
+
ms.author: v-nisba
14
14
ms.collection: M365-identity-device-management
15
-
ms.reviewer: miccohen
15
+
ms.reviewer: v-nisba
16
16
---
17
17
18
-
# Configure F5 BIG-IP SSL-VPN solution in Azure AD
18
+
# Tutorial: Configure F5 BIG-IP SSL-VPN for Azure AD SSO
19
19
20
-
In this tutorial, learn how to configure F5’s BIG-IP based Secure socket layer Virtual private network (SSL-VPN) solution with Azure Active Directory (AD) for Secure Hybrid Access (SHA).
20
+
In this tutorial, learn how to integrate F5’s BIG-IP based Secure socket layer Virtual Private Network (SSL-VPN) with Azure Active Directory (AD) for Secure Hybrid Access (SHA).
21
21
22
-
Configuring a BIG-IP SSL-VPN with Azure AD provides [many key benefits](f5-aad-integration.md), including:
23
-
24
-
- Improved Zero trust governance through [Azure AD pre-authentication and authorization](../../app-service/overview-authentication-authorization.md)
22
+
Enabling a BIG-IP SSL-VPN for Azure AD single sign-on (SSO) provides many benefits, including:
25
23
24
+
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
26
25
-[Password-less authentication to the VPN service](https://www.microsoft.com/security/business/identity/passwordless)
26
+
- Manage Identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/en-us/features/azure-portal/)
27
27
28
-
- Manage Identities and access from a single control plane - The [Azure portal](https://portal.azure.com/#home)
28
+
To learn about all of the benefits, see [Integrate F5 BIG-IP with Azure Active Directory](./f5-aad-integration.md) and [What is single sign-on in Azure Active Directory?](/azure/active-directory/active-directory-appssoaccess-whatis).
29
29
30
-
Despite these great value adds, the classic VPN does however remain predicated on the notion of a network perimeter, where trusted is on the inside and untrusted the outside. This model is no longer effective in achieving a true Zero Trust posture, since corporate assets are no longer confined to the walls of an enterprise data center, but rather across multi-cloud environments with no fixed boundaries. For this reason, we encourage our customers to consider moving to a more Identity driven approach at managing [access on a per application basis](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md).
30
+
Despite these great value adds, classic VPNs do however remain network orientated, often providing little to zero fine grained access to corporate applications. For this reason, we encourage moving to a more Identity centric approach at achieving Zero Trust [access on a per application basis](/fundamentals/five-steps-to-full-application-integration-with-azure-ad).
31
31
32
32
## Scenario description
33
33
34
-
In this scenario, the BIG-IP APM instance of the SSL-VPN service will be configured as a SAML Service Provider (SP) and Azure AD becomes the trusted SAML IDP, providing pre-authentication. Single sign-on (SSO) from Azure AD is then provided through claims-based authentication to the BIG-IP APM, providing a seamless VPN access experience.
34
+
In this scenario, the BIG-IP APM instance of the SSL-VPN service will be configured as a SAML Service Provider (SP) and Azure AD becomes the trusted SAML IDP. SSO from Azure AD is then provided through claims-based authentication to the BIG-IP APM, providing a seamless VPN access experience.
@@ -54,7 +54,7 @@ Prior experience or knowledge of F5 BIG-IP isn't necessary, however, you'll need
54
54
55
55
- The BIG-IP should be provisioned with the necessary SSL certificates for publishing services over HTTPS.
56
56
57
-
Familiarizing yourself with [F5 BIG-IP terminology](https://www.f5.com/services/resources/glossary) will also help understand the various components that are referenced throughout the tutorial.
57
+
Familiarizing yourself with [F5 BIG-IP terminology](https://www.f5.com/services/resources/glossary) will also help understand the various components referenced throughout the tutorial.
58
58
59
59
>[!NOTE]
60
60
>Azure is constantly evolving so don’t be surprised if you find any nuances between the instructions in this guide and what you see in the Azure portal. Screenshots are from BIG-IP v15, however, remain relatively similar from v13.1.
@@ -89,7 +89,7 @@ Setting up a SAML federation trust between the BIG-IP allows the Azure AD BIG-IP
89
89
90
90
- For the Logout URL enter the BIG-IP APM Single logout (SLO) endpoint pre-pended by the host header of the service being published. For example, `https://ssl-vpn.contoso.com/saml/sp/profile/redirect/slr`
91
91
92
-
Providing an SLO URL ensures a user session is terminated at both ends, the BIG-IP and Azure AD, after the user signs out. BIG-IP APM also provides an [option](https://support.f5.com/csp/article/K12056) for terminating all sessions when calling a specific application URL.
92
+
Providing an SLO URL ensures a user session is terminated at both ends, the BIG-IP and Azure AD, after the user signs out. BIG-IP APM also provides an [option](https://support.f5.com/csp/article/K12056) for terminating all sessions when calling a specific application URL.
@@ -136,7 +136,7 @@ The following section creates the BIG-IP SAML service provider and corresponding
136
136
137
137

138
138
139
-
SP **Name** settings are only required if the entity ID isn't an exact match of the hostname portion of the published URL, or if it isn’t in regular hostname-based URL format. Provide the external scheme and hostname of the application being published if entity ID is `urn:ssl-vpn:contosoonline`.
139
+
SP **Name** settings are only required if the entity ID isn't an exact match of the hostname portion of the published URL, or if it isn’t in regular hostname-based URL format. Provide the external scheme and hostname of the application being published if entity ID is `urn:ssl-vpn:contosoonline`.
140
140
141
141
3. Scroll down to select the new **SAML SP object** and select **Bind/UnBind IDP Connectors**.
142
142
@@ -292,15 +292,6 @@ With all the settings in place, the APM now requires a front-end virtual server
292
292
293
293
8. Your SSL-VPN service is now published and accessible via SHA, either directly via its URL or through Microsoft’s application portals.
294
294
295
-
## Additional resources
296
-
297
-
-[The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
298
-
299
-
-[What is Conditional Access?](../conditional-access/overview.md)
300
-
301
-
-[Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
302
-
303
-
-[Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)
304
295
305
296
## Next steps
306
297
@@ -310,3 +301,14 @@ Open a browser on a remote Windows client and browse to the URL of the **BIG-IP
310
301
311
302
Selecting the VPN tile will install the BIG-IP Edge client and establish a VPN connection configured for SHA.
312
303
The F5 VPN application should also be visible as a target resource in Azure AD Conditional Access. See our [guidance](../conditional-access/concept-conditional-access-policies.md) for building Conditional Access policies and also enabling users for Azure AD [password-less authentication](https://www.microsoft.com/security/business/identity/passwordless).
304
+
305
+
306
+
## Additional resources
307
+
308
+
-[The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
309
+
310
+
-[What is Conditional Access?](../conditional-access/overview.md)
311
+
312
+
-[Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
313
+
314
+
-[Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)
0 commit comments