Skip to content

Commit 70a60f3

Browse files
authored
Update f5-big-ip-headers-easy-button.md
1 parent 29ec0c2 commit 70a60f3

File tree

1 file changed

+26
-9
lines changed

1 file changed

+26
-9
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 26 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -355,25 +355,42 @@ In BIG-IP, you can disable the Guided Configuration strict management mode. Then
355355
![Screenshot of the padlock icon.](./media/f5-big-ip-oracle/strict-mode-padlock.png)
356356

357357
> [!NOTE]
358-
> If you ree-enable strict mode and deploy a configuration, the action overwrites settings not in the Guided Configuration. We recommend the advanced configuration for production services.
358+
> If you re-enable strict mode and deploy a configuration, the action overwrites settings not in the Guided Configuration. We recommend the advanced configuration for production services.
359359
360360
## Troubleshooting
361361

362-
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
362+
Use the following guidance when troubleshooting.
363363

364-
1. Navigate to **Access Policy > Overview > Event Logs > Settings**
364+
### Log verbosity
365365

366-
2. Select the row for your published application then **Edit > Access System Logs**
366+
BIG-IP logs help isolate issues with connectivity, SSO, policy, or misconfigured variable mappings. To troubleshoot, increase the log verbosity.
367367

368-
3. Select **Debug** from the SSO list then **OK**
368+
1. Navigate to **Access Policy > Overview.
369+
2. Select **Event Logs**.
370+
3. Select **Settings**.
371+
4. Select the row of your published application
372+
5. Select **Edit**.
373+
6. Select **Access System Logs**.
374+
7. From the SSO list, select **Debug**.
375+
8. Select **OK**.
376+
9. Reproduce the issue.
377+
10. Inspect the logs.
369378

370-
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
379+
> [!NOTE]
380+
> Revert this feature when finished. Verbose mode generates excessive data.
381+
382+
### BIG-IP error message
383+
384+
If a BIG-IP error message appears after Azure AD preauthentication, the issue might relate to Azure AD-to-BIG-IP SSO.
371385

372-
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
386+
1. Navigate to **Access > Overview.
387+
2. Select **Access reports**.
388+
3. Run the report for the last hour.
389+
4. Review the logs for clues.
373390

374-
1. Navigate to **Access > Overview > Access reports**
391+
Use the **View session** variables lin, for the session, to help understand if the APM receives expected Azure AD claims.
375392

376-
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
393+
### No BIG-IP error message
377394

378395
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
379396

0 commit comments

Comments
 (0)