Skip to content

Commit 5fdf55b

Browse files
committed
Fixes
1 parent 1711e20 commit 5fdf55b

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/active-directory-b2c/partner-f5.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -222,9 +222,9 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
222222

223223
|Properties | Descriptions|
224224
|:---------|:---------|
225-
| Client ID | The client ID of the application representing the BIG-IP in your Azure AD B2C tenant.|
225+
| Client ID | The client ID of the application representing the BIG-IP in your Azure AD B2C tenant. |
226226
| Client secret | The application’s corresponding client secret. |
227-
|Client-server SSL profile | Setting an SSL profile will ensure the APM communicates with the Azure AD B2C IdP over TLS. Select the default serverssl option.|
227+
|Client-server SSL profile | Setting an SSL profile will ensure the APM communicates with the Azure AD B2C IdP over TLS. Select the default `serverssl` option. |
228228

229229
- **OAuth request settings**
230230

@@ -281,7 +281,7 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
281281
| Service port | HTTPS |
282282
| Enable redirect port | Check to have users auto redirected from http to https |
283283
| Redirect port | HTTP |
284-
| Client SSL profile | Swap the pre-defined clientssl profile with the one containing your SSL certificate. Testing with the default profile is also ok but will likely cause a browser alert.|
284+
| Client SSL profile | Swap the predefined `clientssl` profile with the one containing your SSL certificate. Testing with the default profile is also ok but will likely cause a browser alert. |
285285

286286
- **Pool properties**
287287

articles/active-directory/manage-apps/f5-bigip-deployment-guide.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Prior F5 BIG-IP experience or knowledge isn't necessary, however, we do recommen
4242

4343
- A wildcard or Subject Alternative Name (SAN) certificate, to publish web applications over Secure Socket Layer (SSL). [Let’s encrypt](https://letsencrypt.org/) offers free 90 days certificate for testing.
4444

45-
- An SSL certificate for securing the BIG-IPs management interface. A certificate used to publish web apps can be used, if its subject corresponds to the BIG-IP's Fully qualified domain name (FQDN). For example, a wildcard certificate defined with a subject *.contoso.com would be suitable for `https://big-ip-vm.contoso.com:8443`
45+
- An SSL certificate for securing the BIG-IPs management interface. A certificate used to publish web apps can be used, if its subject corresponds to the BIG-IP's Fully qualified domain name (FQDN). For example, a wildcard certificate defined with a subject `*.contoso.com` would be suitable for `https://big-ip-vm.contoso.com:8443`
4646

4747
VM deployment and base system configs take approximately 30 minutes, at which point your BIG-IP platform will be ready for implementing any of the SHA scenarios listed in [Integrate F5 BIG-IP with Azure Active Directory](f5-aad-integration.md).
4848

@@ -359,7 +359,7 @@ Provisioning both, Client and Server SSL profiles will have the BIG-IP pre-confi
359359

360360
6. From the left-navigation bar, go to **Local Traffic** > **Profiles** > **SSL** > **Client** and then select **Create**
361361

362-
7. In the **New Client SSL Profile** page, provide a unique friendly name for the new client SSL profile and ensure the Parent profile is set to **clientssl**
362+
7. In the **New Client SSL Profile** page, provide a unique friendly name for the new client SSL profile and ensure the Parent profile is set to `clientssl`.
363363

364364
![The image shows update big-ip](./media/f5ve-deployment-plan/client-ssl.png)
365365

@@ -371,7 +371,7 @@ Provisioning both, Client and Server SSL profiles will have the BIG-IP pre-confi
371371

372372
10. Repeat steps 6-9 to create an **SSL server certificate profile**. From the top ribbon, select **SSL** > **Server** > **Create**.
373373

374-
11. In the **New Server SSL Profile** page, provide a unique friendly name for the new server SSL profile and ensure the Parent profile is set to **serverssl**
374+
11. In the **New Server SSL Profile** page, provide a unique friendly name for the new server SSL profile and ensure the Parent profile is set to `serverssl`.
375375

376376
12. Select the far-right check box for the Certificate and Key rows and from the drop-down list select your imported certificate, followed by **Finished**.
377377

0 commit comments

Comments
 (0)