You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-kerberos-advanced.md
+13-15Lines changed: 13 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ In this tutorial, you'll learn to implement secure hybrid access (SHA) with sing
21
21
* Improved [Zero Trust](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) governance through Azure AD pre-authentication, and use of the Conditional Access security policy enforcement solution.
22
22
* See, [What is Conditional Access?](../conditional-access/overview.md)
23
23
* Full SSO between Azure AD and BIG-IP published services
24
-
* Identity management and access from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
24
+
* Identity management and access from a single control plane, the [Microsoft Entra admin center](https://entra.microsoft.com)
25
25
26
26
To learn more about benefits, see [Integrate F5 BIG-IP with Azure Active Directory](./f5-integration.md).
27
27
@@ -65,17 +65,17 @@ The following image illustrates the SAML SP-initiated flow for this scenario, bu
65
65
66
66
Prior BIG-IP experience isn't necessary. You need:
67
67
68
-
* An [Azure free account](https://azure.microsoft.com/free/active-directory/), or a higher-tier subscription
69
-
* A BIG-IP, or [deploy BIG-IP Virtual Edition in Azure](../manage-apps/f5-bigip-deployment-guide.md)
68
+
* An [Azure free account](https://azure.microsoft.com/free/active-directory/), or a higher-tier subscription.
69
+
* A BIG-IP, or [deploy BIG-IP Virtual Edition in Azure](../manage-apps/f5-bigip-deployment-guide.md).
70
70
* Any of the following F5 BIG-IP licenses:
71
71
* F5 BIG-IP Best bundle
72
72
* F5 BIG-IP APM standalone license
73
73
* F5 BIG-IP APM add-on license on a BIG-IP Local Traffic Manager (LTM)
* User identities [synchronized](../hybrid/connect/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD, or created in Azure AD and flowed back to your on-premises directory
76
-
*An account with Azure AD Application Administrator[permissions](../roles/permissions-reference.md)
77
-
* A web server [certificate](../manage-apps/f5-bigip-deployment-guide.md) for publishing services over HTTPS, or use default BIG-IP certificates while testing
78
-
* A Kerberos application, or go to active-directory-wp.com to learn to configure [SSO with IIS on Windows](https://active-directory-wp.com/docs/Networking/Single_Sign_On/SSO_with_IIS_on_Windows.html)
75
+
* User identities [synchronized](../hybrid/connect/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD, or created in Azure AD and flowed back to your on-premises directory.
76
+
*One of the following roles in Azure AD tenant: Global Administrator, Cloud Application Administrator, or Application Administrator.
77
+
* A web server [certificate](../manage-apps/f5-bigip-deployment-guide.md) for publishing services over HTTPS, or use default BIG-IP certificates while testing.
78
+
* A Kerberos application, or go to active-directory-wp.com to learn to configure [SSO with IIS on Windows](https://active-directory-wp.com/docs/Networking/Single_Sign_On/SSO_with_IIS_on_Windows.html).
79
79
80
80
## BIG-IP configuration methods
81
81
@@ -90,14 +90,12 @@ This article covers the advanced configuration, a flexible SHA implementing that
90
90
91
91
Before BIG-IP can hand off pre-authentication to Azure AD, register it in your tenant. This process initiates SSO between both entities. The app you create from the F5 BIG-IP gallery template is the relying party that represents the SAML SP for the BIG-IP published application.
92
92
93
-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
94
-
2. From the left pane, select the **Azure Active Directory** service.
95
-
3. On the left menu, select **Enterprise applications**. The **All applications** pane appears with a list of the applications in your Azure AD tenant.
96
-
4. On the **Enterprise applications** pane, select **New application**.
97
-
5. The **Browse Azure AD Gallery** pane appears with tiles for cloud platforms, on-premises applications, and featured applications. Applications in the **Featured applications** section have icons that indicate whether they support federated SSO and provisioning.
98
-
6. In the Azure gallery, search for **F5**, and select **F5 BIG-IP APM Azure AD integration**.
99
-
7. Enter a name for the new application to recognize the application instance.
100
-
8. Select **Add/Create** to add it to your tenant.
93
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
94
+
2. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**, then select **New application**.
95
+
3. The **Browse Azure AD Gallery** pane appears with tiles for cloud platforms, on-premises applications, and featured applications. Applications in the **Featured applications** section have icons that indicate whether they support federated SSO and provisioning.
96
+
4. In the Azure gallery, search for **F5**, and select **F5 BIG-IP APM Azure AD integration**.
97
+
5. Enter a name for the new application to recognize the application instance.
98
+
6. Select **Add/Create** to add it to your tenant.
0 commit comments