You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,9 +13,9 @@ ms.author: v-nisba
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Tutorial: Configure F5 BIG-IP’s Easy Button for Header-based and LDAP SSO
16
+
# Tutorial: Configure F5 BIG-IP Easy Button for Header-based and LDAP SSO
17
17
18
-
In this tutorial, you’ll learn to configure F5’s BIG-IP Access Policy Manager (APM) and Azure Active Directory (Azure AD) for secure hybrid access to header-based applications that also require session augmentation through Lightweight Directory Access Protocol (LDAP) sourced attributes.
18
+
In this tutorial, you’ll implement Secure Hybrid Access (SHA) with Single Sign-on (SSO) to header-based applications that also require session augmentation through Lightweight Directory Access Protocol (LDAP) sourced attributes using F5’s BIG-IP Easy Button guided configuration.
19
19
20
20
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
21
21
@@ -150,7 +150,7 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
150
150
151
151
## Configure Easy Button
152
152
153
-
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for secure hybrid access enabled services.
153
+
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
154
154
155
155
1. From a browser, sign-in to the F5 BIG-IP management console
156
156
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
@@ -301,7 +301,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
301
301
>[!NOTE]
302
302
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
303
303
304
-
### Virtual Server
304
+
### Virtual Server Properties
305
305
306
306
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for clients requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
307
307
@@ -311,11 +311,11 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
311
311
312
312
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
313
313
314
-
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing
314
+
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the prerequisites or leave the default if testing
315
315
316
316

317
317
318
-
### Pool
318
+
### Pool Properties
319
319
320
320
The **Application Pool tab** details the services behind a BIG-IP that are represented as a pool, containing one or more application servers.
321
321
@@ -329,7 +329,7 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
329
329
330
330
Our backend application sits on HTTP port 80 but obviously switch to 443 if yours is HTTPS.
331
331
332
-
#### SSO & HTTP Headers
332
+
#### Single Sign-On & HTTP Headers
333
333
334
334
Enabling SSO allows users to access BIG-IP published services without having to enter credentials. The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO, the latter of which we’ll enable to configure the following.
335
335
@@ -394,7 +394,7 @@ There may be cases where the Guided Configuration templates lack the flexibility
394
394
For those scenarios, go ahead and deploy using the Guided Configuration. Then navigate to **Access > Guided Configuration** and select the small padlock icon on the far right of the row for your applications’ configs. At that point, changes via the wizard UI are no longer possible, but all BIG-IP objects associated with the published instance of the application will be unlocked for direct management.
395
395
396
396
>[!NOTE]
397
-
>Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, so use this with caution for production services.
397
+
>Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, therefore we recommend the manual approach for production services.
398
398
399
399
## Troubleshooting
400
400
@@ -408,11 +408,10 @@ BIG-IP logs are a great source of information for isolating all sorts of authent
408
408
409
409
3. Select **Debug** from the SSO list then **OK**
410
410
411
-
Then reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
411
+
Reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
412
412
413
-
1. Navigate to **Access > Overview > Access reports** and run the report for the last hour to see logs provide any clues
414
-
415
-
2. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
413
+
1. Navigate to **Access > Overview > Access reports**
414
+
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
416
415
417
416
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
0 commit comments