You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+47-29Lines changed: 47 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -304,68 +304,86 @@ A BIG-IP supports SSO options, but in OAuth client mode the Guided Configuration
304
304
>[!Note]
305
305
> APM session variables in curly brackets are case-sensitive. Entering agentid when the Azure AD B2C attribute name is sent as AgentID causes an attribute mapping failure. We recommend defining attributes in lowercase. In Azure AD B2C, the user flow prompts the user for more attributes, using the attribute name in the portal. Therefore, sentence case instead of lowercase might be preferable.
306
306
307
-

307
+

308
308
309
309
**Customization properties**
310
310
311
-
These settings allow you to customize the language and the look and feel of the screens that your users encounter when they interact with the APM access policy flow. You can personalize the screen messages and prompts, change screen layouts, colors, images, and localize captions, descriptions, and messages that are normally customizable in the access policy items.
311
+
Customize the language and appearance of screens users see in the APM access policy flow. Edit screen messages and prompts, change screen layouts, colors, images, and localize captions, descriptions, and messages.
312
312
313
-
Replace the “F5 Networks” string in the Form Header text field with the name of your own organization. For example, “Wacketywack Inc. Secure hybrid access”.
313
+
In the **Form Header** text field, replace the `F5 Networks` string with a name that you want.
314
314
315
315
**Session management properties**
316
316
317
-
A BIG-IPs session management setting is used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. These are optional, but we highly recommend implementing single log out (SLO) functionality, which ensures sessions are securely terminated when no longer required, reducing the risk of someone inadvertently gaining unauthorized access to published applications.
317
+
Use the BIG-IP session management settings to define conditions that terminate sessionsor allowed them to continue. Set limits for users and IP addresses, and error pages. We recommend implementing single log out (SLO), which terminates sessions securely, reducing risks of unauthorized access.
318
318
319
-
## Related information
319
+
## Deploy settings
320
320
321
-
The last step provides an overview of configurations. Hitting Deploy will commit your settings and create all necessary BIG-IP and APM objects to enable secure hybrid access to the application.
322
-
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](conditional-access-identity-protection-overview.md).
323
-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
321
+
Select **Deploy** to commit settings and create BIG-IP and APM objects fir secure hybrid access to the application. The application appears as a target resource in Conditional Access. For increased security, block direct access to the application, thereby enforcing a path through the BIG-IP.
324
322
325
-
## Next steps
323
+
Learn more: [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
326
324
327
-
As a user, launch a browser and connect to the application’s external URL. The BIG-IP’s OAuth client logon page will prompt you to log on using Authorization code grant. Instructions for removing this step are provided in the supplemental configuration section.
325
+
### Test the sign-in sign-up flow
328
326
329
-
You will then be redirected to sign up and authenticate against your Azure AD B2C tenant.
327
+
1. As a user, go to the application external URL.
328
+
2. The BIG-IP’s OAuth client sign-in page appears.
329
+
3. Sign in using the authorization code grant. To removing this step, see the **Supplemental configurations** section.
330
+
4. Sign up and authenticate against your Azure AD B2C tenant.
330
331
331
-

332
+
The following images are the user sign in dialog and the sign-in welcome page.
332
333
333
-

334
+

334
335
335
-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, in that way forcing a strict path through the BIG-IP.
336
+

337
+
338
+
For increased security, block direct access to the application, thereby enforcing a path through the BIG-IP.
336
339
337
340
### Supplemental configurations
338
341
339
-
**Single Log-Out (SLO)**
342
+
**Single log-out (SLO)**
343
+
344
+
Azure AD B2C supports identity provider (IdP) and application sign out. See, [Single sign-out](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
345
+
346
+
To achieve SLO, enable your application sign-out function to call the Azure AD B2C log-out endpoint. Then, Azure AD B2C issues a final redirect to the BIG-IP. This action ensures the user-application APM session terminates.
340
347
341
-
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
342
-
Having your application’s sign-out function call the Azure AD B2C log-out endpoint would be one way of achieving SLO. That way we can be sure Azure AD B2C issues a final redirect to the BIG-IP to ensure the APM session between the user and the application has also been terminated.
343
-
Another alternative is to have the BIG-IP listen for the request when selecting the applications sign out button, and upon detecting the request it makes a simultaneous call to the Azure AD B2C logoff endpoint. This approach would avoid having to make any changes to the application itself yet achieves SLO. More details on using BIG-IP iRules to implement this are [available](https://support.f5.com/csp/article/K42052145).
344
-
In either case your Azure AD B2C tenant would need to know the APM’s logout endpoint.
348
+
An alternative SLO process is to enable the BIG-IP to listen for the request, when selecting the applications **Sign out** button. Upon detecting the request it calls to the Azure AD B2C log-off endpoint. This approach precludes making changes to the application.
345
349
346
-
1. Navigate to **Manage** > **Manifest** in your Azure AD B2C portal and locate the logoutUrl property. It should read null.
350
+
To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145).
347
351
348
-
2. Add the APM’s post logout URI: `https://<mysite.com>/my.logout.php3`, where `<mysite.com>` is the BIG-IP FQDN for your own header-based application.
352
+
> [!NOTE]
353
+
> Regardless of approach, ensure the Azure AD B2C tenant knows the APM log-out endpoint.
354
+
355
+
1. In the portal, navigate to **Manage** > **Manifest**.
356
+
2. Locate the `logoutUrl` property. It reads null.
357
+
3. Add the APM post log-out URI: `https://<mysite.com>/my.logout.php3`
358
+
359
+
> [!NOTE]
360
+
> `<mysite.com>` is the BIG-IP FQDN for your header-based application.
349
361
350
362
**Optimized login flow**
351
363
352
364
One optional step for improving the user login experience would be to suppress the OAuth logon prompt displayed to users before Azure AD pre-authentication.
353
365
354
-
1. Navigate to **Access** > **Guided Configuration** and select the small padlock icon on the far right of the row for the header-based application to unlock the strict configuration
366
+
1. Navigate to **Access** > **Guided Configuration**.
367
+
2. On the far right of the row, select the **padlock** icon.
368
+
3. The header-based application unlocks the strict configuration.
369
+
370
+

Unlocking the strict configuration prevents changes with the wizard UI. BIG-IP objects associated with the published instance of the application and open for direct management.
357
373
358
-
Unlocking the strict configuration prevents any further changes via the wizard UI, leaving all BIG-IP objects associated with the published instance of the application open for direct management.
5. For the application policy opject, in the **Per-Session Policy** column, select **Edit**.
359
376
360
-
2. Navigate to **Access** > **Profiles/ Policies** > **Access Profiles (Per-session Policies)** and select the **Per-Session Policy** Edit link for the application’s policy object.
377
+

0 commit comments