You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md
+26-9Lines changed: 26 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -355,25 +355,42 @@ In BIG-IP, you can disable the Guided Configuration strict management mode. Then
355
355

356
356
357
357
> [!NOTE]
358
-
> If you ree-enable strict mode and deploy a configuration, the action overwrites settings not in the Guided Configuration. We recommend the advanced configuration for production services.
358
+
> If you re-enable strict mode and deploy a configuration, the action overwrites settings not in the Guided Configuration. We recommend the advanced configuration for production services.
359
359
360
360
## Troubleshooting
361
361
362
-
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
2. Select the row for your published application then **Edit > Access System Logs**
366
+
BIG-IP logs help isolate issues with connectivity, SSO, policy, or misconfigured variable mappings. To troubleshoot, increase the log verbosity.
367
367
368
-
3. Select **Debug** from the SSO list then **OK**
368
+
1. Navigate to **Access Policy > Overview.
369
+
2. Select **Event Logs**.
370
+
3. Select **Settings**.
371
+
4. Select the row of your published application
372
+
5. Select **Edit**.
373
+
6. Select **Access System Logs**.
374
+
7. From the SSO list, select **Debug**.
375
+
8. Select **OK**.
376
+
9. Reproduce the issue.
377
+
10. Inspect the logs.
369
378
370
-
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
379
+
> [!NOTE]
380
+
> Revert this feature when finished. Verbose mode generates excessive data.
381
+
382
+
### BIG-IP error message
383
+
384
+
If a BIG-IP error message appears after Azure AD preauthentication, the issue might relate to Azure AD-to-BIG-IP SSO.
371
385
372
-
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
386
+
1. Navigate to **Access > Overview.
387
+
2. Select **Access reports**.
388
+
3. Run the report for the last hour.
389
+
4. Review the logs for clues.
373
390
374
-
1. Navigate to **Access > Overview > Access reports**
391
+
Use the **View session** variables lin, for the session, to help understand if the APM receives expected Azure AD claims.
375
392
376
-
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
393
+
### No BIG-IP error message
377
394
378
395
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
0 commit comments