Skip to content

Commit 6ca4b3e

Browse files
authored
Merge pull request #181516 from NishthaBabith-V/patch-3
Update f5-big-ip-ldap-header-easybutton.md
2 parents a65f3f0 + 65a7f31 commit 6ca4b3e

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -114,11 +114,11 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
114114

115115
3. Under Manage, select **App registrations > New registration**
116116

117-
4. Enter a display name for your application. For example, *F5 BIG-IP Easy Button*.
117+
4. Enter a display name for your application. For example, *F5 BIG-IP Easy Button*
118118

119119
5. Specify who can use the application > **Accounts in this organizational directory only**
120120

121-
6. Select **Register** to complete the initial app registration.
121+
6. Select **Register** to complete the initial app registration
122122

123123
7. Navigate to **API permissions** and authorize the following Microsoft Graph permissions:
124124

@@ -152,15 +152,15 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
152152

153153
Next, step through the Easy Button configurations, and complete the trust to start publishing the internal application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for secure hybrid access enabled services.
154154

155-
1. From a browser, sign-in to the F5 BIG-IP management console.
155+
1. From a browser, sign-in to the F5 BIG-IP management console
156156
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
157-
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key.
157+
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key
158158

159159
Once provisioned, the certificate can be used for every application published through Easy Button. You can also choose to upload a separate certificate for individual applications.
160160

161161
![Screenshot for Configure Easy Button- Import SSL certificates and keys](./media/f5-big-ip-easy-button-ldap/configure-easy-button.png)
162162

163-
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
163+
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**
164164

165165
You can now access the Easy Button functionality that provides quick configuration steps to set up the APM as a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
166166

@@ -210,7 +210,7 @@ The Service Provider settings define the SAML SP properties for the APM instance
210210

211211
4. Select **Assertion Decryption Private Key**. The private key for the certificate that BIG-IP APM will use to decrypt Azure AD assertions
212212

213-
5. Select **Assertion Decryption Certificate**. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions. This can be the certificate you provisioned earlier.
213+
5. Select **Assertion Decryption Certificate**. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions. This can be the certificate you provisioned earlier
214214

215215
![Screenshot for Service Provider security settings](./media/f5-big-ip-easy-button-ldap/service-provider-security-settings.png)
216216

@@ -224,9 +224,9 @@ The Easy Button wizard provides a set of pre-defined application templates for O
224224

225225
#### Azure Configuration
226226

227-
1. Enter **Display Name** of app that the BIG-IP creates in your Azure AD tenant, and the icon that the users will see on [MyApps portal](https://myapplications.microsoft.com/).
227+
1. Enter **Display Name** of app that the BIG-IP creates in your Azure AD tenant, and the icon that the users will see on [MyApps portal](https://myapplications.microsoft.com/)
228228

229-
2. Do not enter anything in the **Sign On URL (optional)** to enable IdP initiated sign-on.
229+
2. Do not enter anything in the **Sign On URL (optional)** to enable IdP initiated sign-on
230230

231231
![Screenshot for Azure configuration add display info](./media/f5-big-ip-easy-button-ldap/azure-configuration-properties.png)
232232

@@ -240,7 +240,7 @@ The Easy Button wizard provides a set of pre-defined application templates for O
240240

241241
![Screenshot for Azure configuration - Add signing certificates info](./media/f5-big-ip-easy-button-ldap/azure-configuration-sign-certificates.png)
242242

243-
7. **User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. **Add** a user or group that you can use later for testing, otherwise all access will be denied.
243+
7. **User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. **Add** a user or group that you can use later for testing, otherwise all access will be denied
244244

245245
![Screenshot for Azure configuration - Add users and groups](./media/f5-big-ip-easy-button-ldap/azure-configuration-add-user-groups.png)
246246

@@ -263,9 +263,9 @@ In the **Additional User Attributes tab**, you can enable session augmentation r
263263

264264
1. Enable the **Advanced Settings** option
265265

266-
2. Check the **LDAP Attributes** check box.
266+
2. Check the **LDAP Attributes** check box
267267

268-
3. Choose **Create New** in Choose Authenication Server.
268+
3. Choose **Create New** in Choose Authenication Server
269269

270270
4. Depending on your setup, select either **Use pool** or **Direct** Server Connection mode to provide the **Server Address** of the target LDAP service. If using a single LDAP server, choose *Direct*
271271

@@ -291,9 +291,9 @@ The **Selected Policies** list, by default, displays all policies targeting All
291291

292292
To select a policy to be applied to the application being published:
293293

294-
1. Select the desired policy in the **Available Policies** list.
294+
1. Select the desired policy in the **Available Policies** list
295295

296-
2. Select the right arrow and move it to the **Selected Policies** list.
296+
2. Select the right arrow and move it to the **Selected Policies** list
297297

298298
Selected policies should either have an **Include** or **Exclude** option checked. If both options are checked, the selected policy is not enforced. **Exclude** all policies while testing. You can go back and enable them later.
299299

@@ -312,7 +312,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
312312

313313
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
314314

315-
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing.
315+
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the pre-reqs or leave the default if testing
316316

317317
![Screenshot for Virtual server](./media/f5-big-ip-easy-button-ldap/virtual-server.png)
318318

0 commit comments

Comments
 (0)