You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+13-17Lines changed: 13 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,7 @@
1
1
---
2
2
title: Azure Active Directory integration with F5 BIG-IP for forms based authentication Single Sign-on
3
3
description: Learn how to integrate F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory for secure hybrid access to forms-based applications.
4
-
services: active-directory
5
4
author: gargi-sinha
6
-
manager: martinco
7
5
ms.service: active-directory
8
6
ms.subservice: app-mgmt
9
7
ms.topic: how-to
@@ -25,7 +23,7 @@ Integrating BIG-IP published applications with Azure AD provides many benefits,
25
23
26
24
- Manage Identities and access from a single control plane - The [Azure portal](https://portal.azure.com)
27
25
28
-
To learn about all of the benefits see the article on [F5 BIG-IP and Azure AD integration.](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-aad-integration) and [what is application access and single sign-on with Azure AD](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
26
+
To learn about all of the benefits see the article on [F5 BIG-IP and Azure AD integration.](f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](../active-directory-appssoaccess-whatis.md).
29
27
30
28
## Scenario description
31
29
@@ -67,31 +65,29 @@ Prior BIG-IP experience is not necessary, but you'll need:
67
65
68
66
- An Azure AD free subscription or above
69
67
70
-
- An existing BIG-IP or [deploy a BIG-IP Virtual Edition (VE) in
- An account with Azure AD application admin [permissions](../roles/permissions-reference.md#application-administrator)
91
87
92
-
-[SSL certificate](https://docs.microsoft.com/zure/active-directory/manage-apps/f5-bigip-deployment-guide#ssl-profile) for publishing services over HTTPS or use default certs while testing
88
+
-[SSL certificate](f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS or use default certs while testing
93
89
94
-
- An existing forms-based authentication application or [setup an IIS FBA app](https://docs.microsoft.com/troubleshoot/aspnet/forms-based-authentication) for testing
90
+
- An existing forms-based authentication application or [setup an IIS FBA app](/troubleshoot/aspnet/forms-based-authentication) for testing
95
91
96
92
## Deployment modes
97
93
@@ -106,7 +102,7 @@ flexible approach at implementing secure hybrid access by manually creating all
106
102
107
103
## Adding F5 BIG-IP from the Azure AD gallery
108
104
109
-
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing secure hybrid access. It establishes the integration required for BIG-IP to hand off pre-authentication and [CA](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
105
+
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing secure hybrid access. It establishes the integration required for BIG-IP to hand off pre-authentication and [CA](../conditional-access/overview.md)
110
106
to Azure AD, before granting access to the published service.
111
107
112
108
1. Sign-in to the **Azure portal** using an account with application administrative rights
@@ -150,7 +146,7 @@ to Azure AD, before granting access to the published service.
150
146

151
147
152
148
SAML signing certificates created by Azure AD have a lifespan of 3 years and should be managed using the published
@@ -386,7 +382,7 @@ If making a change to the app is a no go then consider having the BIG-IP listen
386
382
387
383
Your application should now be published and accessible via secure hybrid access, either directly via its URL or through Microsoft's application portals.
388
384
389
-
The application should also be visible as a target resource in Azure AD CA. See the [guidance](https://docs.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-policies) for building CA policies.
385
+
The application should also be visible as a target resource in Azure AD CA. See the [guidance](../conditional-access/concept-conditional-access-policies.md) for building CA policies.
390
386
391
387
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/custom-locations.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
2
title: "Create and manage custom locations on Azure Arc-enabled Kubernetes"
3
-
services: azure-arc
4
3
ms.service: azure-arc
5
4
ms.date: 10/19/2021
6
5
ms.topic: article
@@ -137,7 +136,7 @@ If you are logged into Azure CLI using a service principal, to enable this featu
137
136
138
137
| Parameter name | Description |
139
138
|--------------|------------|
140
-
| `--assign-identity` | Default is `None`. Creates a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) if parameter is set to "SystemAssigned" |
139
+
| `--assign-identity` | Default is `None`. Creates a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) if parameter is set to "SystemAssigned" |
141
140
| `--location, --l` | Location of the custom location Azure Resource Manager resource in Azure. By default, this will be set to the location (or Azure region) of the connected cluster |
142
141
| `--tags` | Space-separated list of tags: key[=value] [key[=value] ...]. Use '' to clear existing tags |
143
142
| `--kubeconfig` | Admin Kubeconfig of Cluster. Needs to passed in as a file if the cluster is a non-AAD enabled cluster |
@@ -193,7 +192,7 @@ Use `update` command when you want to add new tags, associate new cluster extens
193
192
194
193
| Parameter name | Description |
195
194
|--------------|------------|
196
-
|`--assign-identity`| Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to the custom location |
195
+
|`--assign-identity`| Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) to the custom location |
197
196
|`--cluster-extension-ids`| Associate new cluster extensions to this custom location by providing Azure Resource Manager identifiers of the cluster extension instances installed on the connected cluster. Provide a space-seperated list of the cluster extension ids |
198
197
|`--tags`| Add new tags in addition to existing tags.Space-separated list of tags: key[=value][key[=value] ...]. |
199
198
@@ -216,7 +215,7 @@ Use `patch` command when you want to replace existing tags, cluster extension ID
216
215
217
216
| Parameter name | Description |
218
217
|--------------|------------|
219
-
|`--assign-identity`| Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to the custom location |
218
+
|`--assign-identity`| Can be updated to either `None` or `"SystemAssigned` if you want to assign a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) to the custom location |
220
219
|`--cluster-extension-ids`| Associate new cluster extensions to this custom location by providing Azure Resource Manager identifiers of the cluster extension instances installed on the connected cluster. Provide a space-seperated list of the cluster extension IDs |
221
220
|`--tags`| Add new tags in addition to existing tags.Space-separated list of tags: key[=value][key[=value] ...]. |
0 commit comments