You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tutorial: Configure F5 BIG-IP Easy Button for header-based SSO
17
17
18
-
In this article, learn to secure headers based applications with Azure Active Directory (Azure AD), through F5’s BIG-IP Easy Button guided configuration.
18
+
Learn to secure header-based applications with Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration.
19
19
20
20
Integrating a BIG-IP with Azure AD provides many benefits, including:
21
+
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
22
+
* See, [What is Conditional Access?](../conditional-access/overview.md)
23
+
* See, [Zero Trust security](../../security/fundamentals/zero-trust.md)
24
+
* Full SSO between Azure AD and BIG-IP published services
25
+
* Managed identities and access from one control plane
26
+
* See, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
21
27
22
-
*[Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](../conditional-access/overview.md)
28
+
Learn more:
23
29
24
-
* Full SSO between Azure AD and BIG-IP published services
25
-
26
-
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
27
-
28
-
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
30
+
*[Integrate F5 BIG-IP with Azure AD](./f5-aad-integration.md)
31
+
*[Enable SSO for an enterprise application](add-application-portal-setup-sso.md)
29
32
30
33
## Scenario description
31
34
32
-
This scenario looks at the classic legacy application using **HTTP authorization headers** to manage access to protected content.
33
-
34
-
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
35
+
This scenario covers the legacy application using HTTP authorization headers to manage access to protected content. Legacy lacks modern protocols to support direct integration with Azure AD. Modernization is costly, time consuming, and introduces downtime risk. Instead, use an F5 BIG-IP Application Delivery Controller (ADC) to bridge the gap between the legacy application and the modern ID control plane, with protocol transitioning.
35
36
36
-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and headers-based SSO, significantly improving the overall security posture of the application.
37
+
A BIG-IP in front of the application enables uoverlay of the service with Azure AD preauthentication and headers-based SSO This configuration improves overall applicatoin security posture.
37
38
38
-
> [!NOTE]
39
-
> Organizations can also gain remote access to this type of application with [Azure AD Application Proxy](../app-proxy/application-proxy.md)
39
+
> [!NOTE]
40
+
> Organizations can have remote access to this application type with Azure AD Application Proxy. Learn more: [Remote access to on-premises applications through Azure AD Application Proxy](../app-proxy/application-proxy.md)
40
41
41
42
## Scenario architecture
42
43
43
-
The SHA solution for this scenario is made up of:
44
-
45
-
**Application:** BIG-IP published service to be protected by Azure AD SHA.
46
-
47
-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
44
+
The SHA solution contains:
48
45
49
-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
46
+
***Application** - BIG-IP published service to be protected by Azure AD SHA.
47
+
***Azure AD** - Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
48
+
***BIG-IP** - reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the backend application.
50
49
51
50
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
0 commit comments