Skip to content

Commit 4bd3bd5

Browse files
authored
Merge pull request #177055 from JasonWHowell/fixlinks
Fix absolute links
2 parents 05d665b + 388f3dd commit 4bd3bd5

File tree

2 files changed

+16
-21
lines changed

2 files changed

+16
-21
lines changed

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
---
22
title: Azure Active Directory integration with F5 BIG-IP for forms based authentication Single Sign-on
33
description: Learn how to integrate F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory for secure hybrid access to forms-based applications.
4-
services: active-directory
54
author: gargi-sinha
6-
manager: martinco
75
ms.service: active-directory
86
ms.subservice: app-mgmt
97
ms.topic: how-to
@@ -25,7 +23,7 @@ Integrating BIG-IP published applications with Azure AD provides many benefits,
2523

2624
- Manage Identities and access from a single control plane - The [Azure portal](https://portal.azure.com)
2725

28-
To learn about all of the benefits see the article on [F5 BIG-IP and Azure AD integration.](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-aad-integration) and [what is application access and single sign-on with Azure AD](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
26+
To learn about all of the benefits see the article on [F5 BIG-IP and Azure AD integration.](f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](../active-directory-appssoaccess-whatis.md).
2927

3028
## Scenario description
3129

@@ -67,31 +65,29 @@ Prior BIG-IP experience is not necessary, but you'll need:
6765

6866
- An Azure AD free subscription or above
6967

70-
- An existing BIG-IP or [deploy a BIG-IP Virtual Edition (VE) in
71-
Azure](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide)
68+
- An existing BIG-IP or [deploy a BIG-IP Virtual Edition (VE) in Azure](f5-bigip-deployment-guide.md)
7269

7370
- Any of the following F5 BIG-IP license SKUs
7471

75-
- F5 BIG-IP® Best bundle
72+
- F5 BIG-IP® Best bundle
7673

77-
- F5 BIG-IP Access Policy Manager (APM) standalone license
74+
- F5 BIG-IP Access Policy Manager™ (APM) standalone license
7875

79-
- F5 BIG-IP Access Policy Manager (APM) add-on license on
80-
existing BIG-IP F5 BIG-IP® Local Traffic Manager (LTM)
76+
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on
77+
existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
8178

8279
- 90-day BIG-IP full feature [trial
8380
license](https://www.f5.com/trial/big-ip-trial.php)
8481

8582
- User identities
86-
[synchronized](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-whatis)
83+
[synchronized](../hybrid/how-to-connect-sync-whatis.md)
8784
from an on-premises directory to Azure AD
8885

89-
- An account with Azure AD application admin
90-
[permissions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
86+
- An account with Azure AD application admin [permissions](../roles/permissions-reference.md#application-administrator)
9187

92-
- [SSL certificate](https://docs.microsoft.com/zure/active-directory/manage-apps/f5-bigip-deployment-guide#ssl-profile) for publishing services over HTTPS or use default certs while testing
88+
- [SSL certificate](f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS or use default certs while testing
9389

94-
- An existing forms-based authentication application or [setup an IIS FBA app](https://docs.microsoft.com/troubleshoot/aspnet/forms-based-authentication) for testing
90+
- An existing forms-based authentication application or [setup an IIS FBA app](/troubleshoot/aspnet/forms-based-authentication) for testing
9591

9692
## Deployment modes
9793

@@ -106,7 +102,7 @@ flexible approach at implementing secure hybrid access by manually creating all
106102
107103
## Adding F5 BIG-IP from the Azure AD gallery
108104

109-
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing secure hybrid access. It establishes the integration required for BIG-IP to hand off pre-authentication and [CA](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
105+
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing secure hybrid access. It establishes the integration required for BIG-IP to hand off pre-authentication and [CA](../conditional-access/overview.md)
110106
to Azure AD, before granting access to the published service.
111107

112108
1. Sign-in to the **Azure portal** using an account with application administrative rights
@@ -150,7 +146,7 @@ to Azure AD, before granting access to the published service.
150146
![Screenshot of federation metadata download link](./media/f5-big-ip-forms-advanced/saml-certificate.png)
151147

152148
SAML signing certificates created by Azure AD have a lifespan of 3 years and should be managed using the published
153-
[guidance](https://docs.microsoft.com/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on).
149+
[guidance](manage-certificates-for-federated-single-sign-on.md).
154150

155151
### Azure AD authorization
156152

@@ -386,7 +382,7 @@ If making a change to the app is a no go then consider having the BIG-IP listen
386382

387383
Your application should now be published and accessible via secure hybrid access, either directly via its URL or through Microsoft's application portals.
388384

389-
The application should also be visible as a target resource in Azure AD CA. See the [guidance](https://docs.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-policies) for building CA policies.
385+
The application should also be visible as a target resource in Azure AD CA. See the [guidance](../conditional-access/concept-conditional-access-policies.md) for building CA policies.
390386

391387
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
392388

articles/azure-arc/kubernetes/custom-locations.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: "Create and manage custom locations on Azure Arc-enabled Kubernetes"
3-
services: azure-arc
43
ms.service: azure-arc
54
ms.date: 10/19/2021
65
ms.topic: article
@@ -137,7 +136,7 @@ If you are logged into Azure CLI using a service principal, to enable this featu
137136
138137
| Parameter name | Description |
139138
|--------------|------------|
140-
| `--assign-identity` | Default is `None`. Creates a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) if parameter is set to "SystemAssigned" |
139+
| `--assign-identity` | Default is `None`. Creates a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) if parameter is set to "SystemAssigned" |
141140
| `--location, --l` | Location of the custom location Azure Resource Manager resource in Azure. By default, this will be set to the location (or Azure region) of the connected cluster |
142141
| `--tags` | Space-separated list of tags: key[=value] [key[=value] ...]. Use '' to clear existing tags |
143142
| `--kubeconfig` | Admin Kubeconfig of Cluster. Needs to passed in as a file if the cluster is a non-AAD enabled cluster |
@@ -193,7 +192,7 @@ Use `update` command when you want to add new tags, associate new cluster extens
193192

194193
| Parameter name | Description |
195194
|--------------|------------|
196-
| `--assign-identity` | Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to the custom location |
195+
| `--assign-identity` | Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) to the custom location |
197196
| `--cluster-extension-ids` | Associate new cluster extensions to this custom location by providing Azure Resource Manager identifiers of the cluster extension instances installed on the connected cluster. Provide a space-seperated list of the cluster extension ids |
198197
| `--tags` | Add new tags in addition to existing tags.Space-separated list of tags: key[=value] [key[=value] ...]. |
199198

@@ -216,7 +215,7 @@ Use `patch` command when you want to replace existing tags, cluster extension ID
216215

217216
| Parameter name | Description |
218217
|--------------|------------|
219-
| `--assign-identity` | Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to the custom location |
218+
| `--assign-identity` | Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) to the custom location |
220219
| `--cluster-extension-ids` | Associate new cluster extensions to this custom location by providing Azure Resource Manager identifiers of the cluster extension instances installed on the connected cluster. Provide a space-seperated list of the cluster extension IDs |
221220
| `--tags` | Add new tags in addition to existing tags.Space-separated list of tags: key[=value] [key[=value] ...]. |
222221

0 commit comments

Comments
 (0)