You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,11 +114,11 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
114
114
115
115
3. Under Manage, select **App registrations > New registration**
116
116
117
-
4. Enter a display name for your application. For example, *F5 BIG-IP Easy Button*.
117
+
4. Enter a display name for your application. For example, *F5 BIG-IP Easy Button*
118
118
119
119
5. Specify who can use the application > **Accounts in this organizational directory only**
120
120
121
-
6. Select **Register** to complete the initial app registration.
121
+
6. Select **Register** to complete the initial app registration
122
122
123
123
7. Navigate to **API permissions** and authorize the following Microsoft Graph permissions:
124
124
@@ -152,15 +152,15 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
152
152
153
153
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for secure hybrid access enabled services.
154
154
155
-
1. From a browser, sign-in to the F5 BIG-IP management console.
155
+
1. From a browser, sign-in to the F5 BIG-IP management console
156
156
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
157
-
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key.
157
+
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key
158
158
159
159
Once provisioned, the certificate can be used for every application published through Easy Button. You can also choose to upload a separate certificate for individual applications.
160
160
161
161

162
162
163
-
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
163
+
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**
164
164
165
165
You can now access the Easy Button functionality that provides quick configuration steps to set up the APM as a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
166
166
@@ -210,7 +210,7 @@ The Service Provider settings define the SAML SP properties for the APM instance
210
210
211
211
4. Select **Assertion Decryption Private Key**. The private key for the certificate that BIG-IP APM will use to decrypt Azure AD assertions
212
212
213
-
5. Select **Assertion Decryption Certificate**. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions. This can be the certificate you provisioned earlier.
213
+
5. Select **Assertion Decryption Certificate**. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions. This can be the certificate you provisioned earlier
214
214
215
215

216
216
@@ -224,9 +224,9 @@ The Easy Button wizard provides a set of pre-defined application templates for O
224
224
225
225
#### Azure Configuration
226
226
227
-
1. Enter **Display Name** of app that the BIG-IP creates in your Azure AD tenant, and the icon that the users will see on [MyApps portal](https://myapplications.microsoft.com/).
227
+
1. Enter **Display Name** of app that the BIG-IP creates in your Azure AD tenant, and the icon that the users will see on [MyApps portal](https://myapplications.microsoft.com/)
228
228
229
-
2. Do not enter anything in the **Sign On URL (optional)** to enable IdP initiated sign-on.
229
+
2. Do not enter anything in the **Sign On URL (optional)** to enable IdP initiated sign-on
230
230
231
231

232
232
@@ -240,7 +240,7 @@ The Easy Button wizard provides a set of pre-defined application templates for O
240
240
241
241

242
242
243
-
7.**User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. **Add** a user or group that you can use later for testing, otherwise all access will be denied.
243
+
7.**User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. **Add** a user or group that you can use later for testing, otherwise all access will be denied
244
244
245
245

246
246
@@ -263,9 +263,9 @@ In the **Additional User Attributes tab**, you can enable session augmentation r
263
263
264
264
1. Enable the **Advanced Settings** option
265
265
266
-
2. Check the **LDAP Attributes** check box.
266
+
2. Check the **LDAP Attributes** check box
267
267
268
-
3. Choose **Create New** in Choose Authenication Server.
268
+
3. Choose **Create New** in Choose Authenication Server
269
269
270
270
4. Depending on your setup, select either **Use pool** or **Direct** Server Connection mode to provide the **Server Address** of the target LDAP service. If using a single LDAP server, choose *Direct*
271
271
@@ -291,9 +291,9 @@ The **Selected Policies** list, by default, displays all policies targeting All
291
291
292
292
To select a policy to be applied to the application being published:
293
293
294
-
1. Select the desired policy in the **Available Policies** list.
294
+
1. Select the desired policy in the **Available Policies** list
295
295
296
-
2. Select the right arrow and move it to the **Selected Policies** list.
296
+
2. Select the right arrow and move it to the **Selected Policies** list
297
297
298
298
Selected policies should either have an **Include** or **Exclude** option checked. If both options are checked, the selected policy is not enforced. **Exclude** all policies while testing. You can go back and enable them later.
299
299
@@ -312,7 +312,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
312
312
313
313
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
314
314
315
-
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing.
315
+
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing
316
316
317
317

0 commit comments