Skip to content

Commit 3d94540

Browse files
authored
Update f5-big-ip-headers-easy-button.md
1 parent ebc871c commit 3d94540

File tree

1 file changed

+18
-19
lines changed

1 file changed

+18
-19
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,38 +15,37 @@ ms.collection: M365-identity-device-management
1515

1616
# Tutorial: Configure F5 BIG-IP Easy Button for header-based SSO
1717

18-
In this article, learn to secure headers based applications with Azure Active Directory (Azure AD), through F5’s BIG-IP Easy Button guided configuration.
18+
Learn to secure header-based applications with Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration.
1919

2020
Integrating a BIG-IP with Azure AD provides many benefits, including:
21+
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
22+
* See, [What is Conditional Access?](../conditional-access/overview.md)
23+
* See, [Zero Trust security](../../security/fundamentals/zero-trust.md)
24+
* Full SSO between Azure AD and BIG-IP published services
25+
* Managed identities and access from one control plane
26+
* See, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
2127

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](../conditional-access/overview.md)
28+
Learn more:
2329

24-
* Full SSO between Azure AD and BIG-IP published services
25-
26-
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
27-
28-
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
30+
* [Integrate F5 BIG-IP with Azure AD](./f5-aad-integration.md)
31+
* [Enable SSO for an enterprise application](add-application-portal-setup-sso.md)
2932

3033
## Scenario description
3134

32-
This scenario looks at the classic legacy application using **HTTP authorization headers** to manage access to protected content.
33-
34-
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
35+
This scenario covers the legacy application using HTTP authorization headers to manage access to protected content. Legacy lacks modern protocols to support direct integration with Azure AD. Modernization is costly, time consuming, and introduces downtime risk. Instead, use an F5 BIG-IP Application Delivery Controller (ADC) to bridge the gap between the legacy application and the modern ID control plane, with protocol transitioning.
3536

36-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and headers-based SSO, significantly improving the overall security posture of the application.
37+
A BIG-IP in front of the application enables uoverlay of the service with Azure AD preauthentication and headers-based SSO This configuration improves overall applicatoin security posture.
3738

38-
> [!NOTE]
39-
> Organizations can also gain remote access to this type of application with [Azure AD Application Proxy](../app-proxy/application-proxy.md)
39+
> [!NOTE]
40+
> Organizations can have remote access to this application type with Azure AD Application Proxy. Learn more: [Remote access to on-premises applications through Azure AD Application Proxy](../app-proxy/application-proxy.md)
4041
4142
## Scenario architecture
4243

43-
The SHA solution for this scenario is made up of:
44-
45-
**Application:** BIG-IP published service to be protected by Azure AD SHA.
46-
47-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
44+
The SHA solution contains:
4845

49-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
46+
* **Application** - BIG-IP published service to be protected by Azure AD SHA.
47+
* **Azure AD** - Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
48+
* **BIG-IP** - reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
5049

5150
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
5251

0 commit comments

Comments
 (0)