Skip to content

Commit 77a67c2

Browse files
authored
Update partner-f5.md
1 parent f28104f commit 77a67c2

File tree

1 file changed

+47
-29
lines changed

1 file changed

+47
-29
lines changed

articles/active-directory-b2c/partner-f5.md

Lines changed: 47 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -304,68 +304,86 @@ A BIG-IP supports SSO options, but in OAuth client mode the Guided Configuration
304304
>[!Note]
305305
> APM session variables in curly brackets are case-sensitive. Entering agentid when the Azure AD B2C attribute name is sent as AgentID causes an attribute mapping failure. We recommend defining attributes in lowercase. In Azure AD B2C, the user flow prompts the user for more attributes, using the attribute name in the portal. Therefore, sentence case instead of lowercase might be preferable.
306306
307-
![Screenshot of single sign-on settings.](./media/partner-f5/single-sign-on.png)
307+
![Screenshot of single sign-on settings, including type and headers.](./media/partner-f5/single-sign-on.png)
308308

309309
**Customization properties**
310310

311-
These settings allow you to customize the language and the look and feel of the screens that your users encounter when they interact with the APM access policy flow. You can personalize the screen messages and prompts, change screen layouts, colors, images, and localize captions, descriptions, and messages that are normally customizable in the access policy items.
311+
Customize the language and appearance of screens users see in the APM access policy flow. Edit screen messages and prompts, change screen layouts, colors, images, and localize captions, descriptions, and messages.
312312

313-
Replace the “F5 Networks” string in the Form Header text field with the name of your own organization. For example, “Wacketywack Inc. Secure hybrid access”.
313+
In the **Form Header** text field, replace the `F5 Networks` string with a name that you want.
314314

315315
**Session management properties**
316316

317-
A BIG-IPs session management setting is used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. These are optional, but we highly recommend implementing single log out (SLO) functionality, which ensures sessions are securely terminated when no longer required, reducing the risk of someone inadvertently gaining unauthorized access to published applications.
317+
Use the BIG-IP session management settings to define conditions that terminate sessionsor allowed them to continue. Set limits for users and IP addresses, and error pages. We recommend implementing single log out (SLO), which terminates sessions securely, reducing risks of unauthorized access.
318318

319-
## Related information
319+
## Deploy settings
320320

321-
The last step provides an overview of configurations. Hitting Deploy will commit your settings and create all necessary BIG-IP and APM objects to enable secure hybrid access to the application.
322-
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](conditional-access-identity-protection-overview.md).
323-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
321+
Select **Deploy** to commit settings and create BIG-IP and APM objects fir secure hybrid access to the application. The application appears as a target resource in Conditional Access. For increased security, block direct access to the application, thereby enforcing a path through the BIG-IP.
324322

325-
## Next steps
323+
Learn more: [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
326324

327-
As a user, launch a browser and connect to the application’s external URL. The BIG-IP’s OAuth client logon page will prompt you to log on using Authorization code grant. Instructions for removing this step are provided in the supplemental configuration section.
325+
### Test the sign-in sign-up flow
328326

329-
You will then be redirected to sign up and authenticate against your Azure AD B2C tenant.
327+
1. As a user, go to the application external URL.
328+
2. The BIG-IP’s OAuth client sign-in page appears.
329+
3. Sign in using the authorization code grant. To removing this step, see the **Supplemental configurations** section.
330+
4. Sign up and authenticate against your Azure AD B2C tenant.
330331

331-
![Screenshot shows user sign in](./media/partner-f5/sign-in-message.png)
332+
The following images are the user sign in dialog and the sign-in welcome page.
332333

333-
![Screenshot shows post sign in welcome message](./media/partner-f5/welcome-page.png)
334+
![Screenshot of the user sign-in dialog box.](./media/partner-f5/sign-in-message.png)
334335

335-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
336+
![Screenshot of the sign-in welcome page.](./media/partner-f5/welcome-page.png)
337+
338+
For increased security, block direct access to the application, thereby enforcing a path through the BIG-IP.
336339

337340
### Supplemental configurations
338341

339-
**Single Log-Out (SLO)**
342+
**Single log-out (SLO)**
343+
344+
Azure AD B2C supports identity provider (IdP) and application sign out. See, [Single sign-out](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
345+
346+
To achieve SLO, enable your application sign-out function to call the Azure AD B2C log-out endpoint. Then, Azure AD B2C issues a final redirect to the BIG-IP. This action ensures the user-application APM session terminates.
340347

341-
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
342-
Having your application’s sign-out function call the Azure AD B2C log-out endpoint would be one way of achieving SLO. That way we can be sure Azure AD B2C issues a final redirect to the BIG-IP to ensure the APM session between the user and the application has also been terminated.
343-
Another alternative is to have the BIG-IP listen for the request when selecting the applications sign out button, and upon detecting the request it makes a simultaneous call to the Azure AD B2C logoff endpoint. This approach would avoid having to make any changes to the application itself yet achieves SLO. More details on using BIG-IP iRules to implement this are [available](https://support.f5.com/csp/article/K42052145).
344-
In either case your Azure AD B2C tenant would need to know the APM’s logout endpoint.
348+
An alternative SLO process is to enable the BIG-IP to listen for the request, when selecting the applications **Sign out** button. Upon detecting the request it calls to the Azure AD B2C log-off endpoint. This approach precludes making changes to the application.
345349

346-
1. Navigate to **Manage** > **Manifest** in your Azure AD B2C portal and locate the logoutUrl property. It should read null.
350+
To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145).
347351

348-
2. Add the APM’s post logout URI: `https://<mysite.com>/my.logout.php3`, where `<mysite.com>` is the BIG-IP FQDN for your own header-based application.
352+
> [!NOTE]
353+
> Regardless of approach, ensure the Azure AD B2C tenant knows the APM log-out endpoint.
354+
355+
1. In the portal, navigate to **Manage** > **Manifest**.
356+
2. Locate the `logoutUrl` property. It reads null.
357+
3. Add the APM post log-out URI: `https://<mysite.com>/my.logout.php3`
358+
359+
> [!NOTE]
360+
> `<mysite.com>` is the BIG-IP FQDN for your header-based application.
349361
350362
**Optimized login flow**
351363

352364
One optional step for improving the user login experience would be to suppress the OAuth logon prompt displayed to users before Azure AD pre-authentication.
353365

354-
1. Navigate to **Access** > **Guided Configuration** and select the small padlock icon on the far right of the row for the header-based application to unlock the strict configuration
366+
1. Navigate to **Access** > **Guided Configuration**.
367+
2. On the far right of the row, select the **padlock** icon.
368+
3. The header-based application unlocks the strict configuration.
369+
370+
![Screenshot of input for Status, Name, and Type; also the padlock icon.](./media/partner-f5/optimized-login-flow.png)
355371

356-
![Screenshot shows optimized login flow](./media/partner-f5/optimized-login-flow.png)
372+
Unlocking the strict configuration prevents changes with the wizard UI. BIG-IP objects associated with the published instance of the application and open for direct management.
357373

358-
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
374+
4. Navigate to **Access** > **Profiles/ Policies** > **Access Profiles (Per-session Policies)**.
375+
5. For the application policy opject, in the **Per-Session Policy** column, select **Edit**.
359376

360-
2. Navigate to **Access** > **Profiles/ Policies** > **Access Profiles (Per-session Policies)** and select the **Per-Session Policy** Edit link for the application’s policy object.
377+
![Screenshot of the Edit option under Access Policies, on the Access dialog.](./media/partner-f5/access-profile.png)
361378

362-
![Screenshot shows access profiles](./media/partner-f5/access-profile.png)
379+
6. To delete the **OAuth Logon Page** policy object, select **X**.
380+
7. At the prompt, connect to the previous node.
363381

364-
3. Select the small cross to delete the OAuth Logon Page policy object and when prompted choose to connect to the previous node.
382+
![Screenshot of the X option on the OAuth Logon Page policy object.](./media/partner-f5/oauth-logon.png)
365383

366-
![Screenshot shows OAuth logon page](./media/partner-f5/oauth-logon.png)
384+
8. In the top left corner, select **Apply Access Policy**.
385+
9. Close the visual editor tab.
367386

368-
4. Select **Apply Access Policy** in the top left-hand corner and close the visual editor tab.
369387
The next attempt at connecting to the application should take you straight to the Azure AD B2C sign-in page.
370388

371389
>[!Note]

0 commit comments

Comments
 (0)