Skip to content

Commit 5909335

Browse files
authored
Merge pull request #189241 from Rainier-MSFT/patch-123
Correction
2 parents f468d63 + fa1ca05 commit 5909335

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,12 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
3131

3232
This scenario looks at the classic legacy application using HTTP authorization headers to control access to protected content.
3333

34-
Being legacy, the application lacks any form of modern protocols to support a direct integration with Azure AD. Modernizing the app is also costly, requires careful planning, and introduces risk of potential downtime.
34+
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
3535

36-
One option would be to consider [Azure AD Application Proxy](../app-proxy/application-proxy.md), to gate remote access to the application.
36+
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and headers-based SSO, significantly improving the overall security posture of the application.
3737

38-
Another approach is to use an F5 BIG-IP Application Delivery Controller (ADC), as it too provides the protocol transitioning required to bridge legacy applications to the modern ID control plane.
39-
40-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for both remote and local access.
38+
> [!NOTE]
39+
> Organizations can also gain remote access to this type of application with [Azure AD Application Proxy](../app-proxy/application-proxy.md)
4140
4241
## Scenario architecture
4342

@@ -144,7 +143,7 @@ You can now access the Easy Button functionality that provides quick configurati
144143

145144
![Screenshot for Configure Easy Button- Install the template](./media/f5-big-ip-easy-button-ldap/easy-button-template.png)
146145

147-
5. Review the list of configuration steps and select Next
146+
5. Review the list of configuration steps and select **Next**
148147

149148
![Screenshot for Configure Easy Button - List configuration steps](./media/f5-big-ip-easy-button-ldap/config-steps.png)
150149

@@ -164,7 +163,7 @@ Consider the **Azure Service Account Details** be the BIG-IP client application
164163

165164
2. Enable **Single Sign-On (SSO) & HTTP Headers**
166165

167-
3. Enter the **Tenant Id**, **Client ID**, and **Client Secret** you noted down during tenant registration
166+
3. Enter the **Tenant Id**, **Client ID**, and **Client Secret** you noted when registering the Easy Button client in your tenant.
168167

169168
4. Confirm the BIG-IP can successfully connect to your tenant, and then select **Next**
170169

@@ -380,4 +379,4 @@ If you don’t see a BIG-IP error page, then the issue is probably more related
380379

381380
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes
382381

383-
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).
382+
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).

0 commit comments

Comments
 (0)