Skip to content

Commit 3375cc7

Browse files
authored
Merge pull request #183228 from NishthaBabith-V/patch-12
Update f5-big-ip-ldap-header-easybutton.md
2 parents 4488a65 + 5c5c95c commit 3375cc7

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ ms.author: v-nisba
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Tutorial: Configure F5 BIG-IP’s Easy Button for Header-based and LDAP SSO
16+
# Tutorial: Configure F5 BIG-IP Easy Button for Header-based and LDAP SSO
1717

18-
In this tutorial, you’ll learn to configure F5’s BIG-IP Access Policy Manager (APM) and Azure Active Directory (Azure AD) for secure hybrid access to header-based applications that also require session augmentation through Lightweight Directory Access Protocol (LDAP) sourced attributes.
18+
In this tutorial, you’ll implement Secure Hybrid Access (SHA) with Single Sign-on (SSO) to header-based applications that also require session augmentation through Lightweight Directory Access Protocol (LDAP) sourced attributes using F5’s BIG-IP Easy Button guided configuration.
1919

2020
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
2121

@@ -150,7 +150,7 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
150150

151151
## Configure Easy Button
152152

153-
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for secure hybrid access enabled services.
153+
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
154154

155155
1. From a browser, sign-in to the F5 BIG-IP management console
156156
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
@@ -301,7 +301,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
301301
>[!NOTE]
302302
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
303303
304-
### Virtual Server
304+
### Virtual Server Properties
305305

306306
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for clients requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
307307

@@ -311,11 +311,11 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
311311

312312
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
313313

314-
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing
314+
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the prerequisites or leave the default if testing
315315

316316
![Screenshot for Virtual server](./media/f5-big-ip-easy-button-ldap/virtual-server.png)
317317

318-
### Pool
318+
### Pool Properties
319319

320320
The **Application Pool tab** details the services behind a BIG-IP that are represented as a pool, containing one or more application servers.
321321

@@ -329,7 +329,7 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
329329

330330
Our backend application sits on HTTP port 80 but obviously switch to 443 if yours is HTTPS.
331331

332-
#### SSO & HTTP Headers
332+
#### Single Sign-On & HTTP Headers
333333

334334
Enabling SSO allows users to access BIG-IP published services without having to enter credentials. The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO, the latter of which we’ll enable to configure the following.
335335

@@ -394,7 +394,7 @@ There may be cases where the Guided Configuration templates lack the flexibility
394394
For those scenarios, go ahead and deploy using the Guided Configuration. Then navigate to **Access > Guided Configuration** and select the small padlock icon on the far right of the row for your applications’ configs. At that point, changes via the wizard UI are no longer possible, but all BIG-IP objects associated with the published instance of the application will be unlocked for direct management.
395395

396396
>[!NOTE]
397-
>Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, so use this with caution for production services.
397+
>Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, therefore we recommend the manual approach for production services.
398398
399399
## Troubleshooting
400400

@@ -408,11 +408,10 @@ BIG-IP logs are a great source of information for isolating all sorts of authent
408408

409409
3. Select **Debug** from the SSO list then **OK**
410410

411-
Then reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
411+
Reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
412412

413-
1. Navigate to **Access > Overview > Access reports** and run the report for the last hour to see logs provide any clues
414-
415-
2. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
413+
1. Navigate to **Access > Overview > Access reports**
414+
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
416415

417416
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
418417

0 commit comments

Comments
 (0)