You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -29,6 +29,9 @@ Watch this video to learn about Azure AD B2C user migration using Microsoft Grap
29
29
To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
30
30
31
31
## User management
32
+
> [!NOTE]
33
+
> Azure AD B2C currently does not support advanced query capabilities on directory objects. This means that there is no support for `$count`, `$search` query parameters and Not (`not`), Not equals (`ne`), and Ends with (`endsWith`) operators in `$filter` query parameter. For more information, see [query parameters in Microsoft Graph](/graph/query-parameters) and [advanced query capabilities in Microsoft Graph](/graph/aad-advanced-queries).
34
+
32
35
33
36
-[List users](/graph/api/user-list)
34
37
-[Create a consumer user](/graph/api/user-post-users)
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-bloksec.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The following architecture diagram shows the implementation.
50
50
51
51
## Onboard to BlokSec
52
52
53
-
Request a demo tenant with BlokSec by filling out [the form](https://bloksec.com/request-a-demo/). In the message field indicates that you would like to onboard with Azure AD B2C. Download and install the free BlokSec yuID mobile app from the app store. Once your demo tenant has been prepared, you'll receive an email. On your mobile device where the BlokSec application is installed, select the link to register your admin account with your yuID app.
53
+
Request a demo tenant with BlokSec by filling out [the form](https://bloksec.com/). In the message field indicates that you would like to onboard with Azure AD B2C. Download and install the free BlokSec yuID mobile app from the app store. Once your demo tenant has been prepared, you'll receive an email. On your mobile device where the BlokSec application is installed, select the link to register your admin account with your yuID app.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-condition-filters-for-devices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ The following device attributes can be used with the filter for devices conditio
118
118
| mdmAppId | Equals, NotEquals, In, NotIn | A valid MDM application ID | (device.mdmAppId -in [“0000000a-0000-0000-c000-000000000000”]|
119
119
| model | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | Any string | (device.model -notContains “Surface”) |
120
120
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq “Windows”) |
121
-
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10) | (device.operatingSystemVersion -in [“10.0.18363”, “10.0.19041”, “10.0.19042”]) |
121
+
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10 and Windows 11) | (device.operatingSystemVersion -in [“10.0.18363”, “10.0.19041”, “10.0.19042”, “10.0.22000”]) |
122
122
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]:value") |
123
123
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -notIn [“Printer”, “Shared”, “IoT”]|
124
124
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-initializing-client-applications.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ The modifiers you can set on a public client or confidential client application
97
97
98
98
|Modifier | Description|
99
99
|--------- | --------- |
100
-
|`.WithAuthority()` 7 overrides| Sets the application default authority to an Azure AD authority, with the possibility of choosing the Azure Cloud, the audience, the tenant (tenant ID or domain name), or providing directly the authority URI.|
100
+
|[`.WithAuthority()`](/dotnet/api/microsoft.identity.client.abstractapplicationbuilder-1.withauthority)| Sets the application default authority to an Azure AD authority, with the possibility of choosing the Azure Cloud, the audience, the tenant (tenant ID or domain name), or providing directly the authority URI.|
101
101
|`.WithAdfsAuthority(string)`| Sets the application default authority to be an ADFS authority.|
102
102
|`.WithB2CAuthority(string)`| Sets the application default authority to be an Azure AD B2C authority.|
103
103
|`.WithClientId(string)`| Overrides the client ID.|
You will also need to synchronize your sensitivity labels to Azure AD. For instructions, see [How to enable sensitivity labels for containers and synchronize labels](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-install-prerequisites.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,6 +67,7 @@ To read more about securing your Active Directory environment, see [Best practic
67
67
- The servers where AD FS or Web Application Proxy are installed must be Windows Server 2012 R2 or later. Windows remote management must be enabled on these servers for remote installation.
68
68
- You must configure TLS/SSL certificates. For more information, see [Managing SSL/TLS protocols and cipher suites for AD FS](/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs) and [Managing SSL certificates in AD FS](/windows-server/identity/ad-fs/operations/manage-ssl-certificates-ad-fs-wap).
69
69
- You must configure name resolution.
70
+
- It is not supported to break and analyze traffic between Azure AD Connect and Azure AD. Doing so may disrupt the service.
70
71
- If your global administrators have MFA enabled, the URL https://secure.aadcdn.microsoftonline-p.com*must* be in the trusted sites list. You're prompted to add this site to the trusted sites list when you're prompted for an MFA challenge and it hasn't been added before. You can use Internet Explorer to add it to your trusted sites.
71
72
- If you plan to use Azure AD Connect Health for syncing, ensure that the prerequisites for Azure AD Connect Health are also met. For more information, see [Azure AD Connect Health agent installation](how-to-connect-health-agent-install.md).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+20-23Lines changed: 20 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Azure Active Directory integration with F5 BIG-IP for forms based authentication Single Sign-on
2
+
title: F5 BIG-IP APM and Azure AD SSO to forms based authentication applications
3
3
description: Learn how to integrate F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory for secure hybrid access to forms-based applications.
4
4
author: gargi-sinha
5
5
ms.service: active-directory
@@ -35,9 +35,13 @@ Instead, a BIG-IP Virtual Edition (VE) deployed between the internet and the int
35
35
36
36
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and forms-based SSO, significantly improving the overall security posture of the application, allowing the business to continue operating at pace, without interruption.
37
37
38
+
User credentials cached by the BIG-IP APM are then available for SSO against other forms based-authentication applications.
39
+
40
+
## Scenario Architecture
41
+
38
42
The secure hybrid access solution for this scenario is made up of the following:
39
43
40
-
**Application**: Backend service to be protected by Azure AD and BIG-IP secure hybrid access. This particular application validates user credentials against an open source, but this could be any directory including Active Directory, LDS, etc.
44
+
**Application**: Backend service to be protected by Azure AD and BIG-IP secure hybrid access. This particular application validates user credentials against Active Directory (AD), but this could be any directory including LDS (AD Lightweight Directory Services), open source, etc.
41
45
42
46
**Azure AD**: The SAML Identity Provider (IdP), responsible for
43
47
verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP APM.
@@ -51,13 +55,13 @@ performing forms-based SSO to the backend application.
51
55
| Steps | Description|
52
56
|:-------|:----------|
53
57
| 1. | User connects to application's SAML SP endpoint (BIG-IP APM).|
54
-
|2. | APM access policy redirects user to SAML IdP (Azure AD) for pre-authentication.|
55
-
| 3. |SAML IdP authenticates user and applies any enforced CA policies.|
56
-
| 4. |Azure AD redirects user back to SAML SP with issued token and claims. |
57
-
| 5. |APM prompts for application password and stores in cache. |
58
-
| 6. |BIG-IP request to application receives login form.|
59
-
| 7. | APM scripting responds filling in username and password before submitting form.|
60
-
| 8. | Application payload is served by webserver and sent to the client. Optionally, APM detects successful logon by examining response headers, looking for cookie or redirect URI.|
58
+
|2. | APM access policy redirects user to SAML IdP (Azure AD) for pre-authentication.|
59
+
| 3. |Azure AD authenticates user and applies any enforced Conditional Access policies.|
60
+
| 4. |User is redirected back to SAML SP with issued token and claims. |
61
+
| 5. |BIG-IP prompts user for application password and stores in cache. |
62
+
| 6. | BIG-IP sends request to application and receives a login form.|
63
+
| 7. | APM scripting auto responds filling in username and password before submitting form.|
64
+
| 8. | Application payload is served by webserver and sent to the client. Optionally, APM detects successful logon by examining response headers, looking for cookie or redirect URI.|
61
65
62
66
## Prerequisites
63
67
@@ -91,11 +95,8 @@ Prior BIG-IP experience is not necessary, but you'll need:
91
95
92
96
## Deployment modes
93
97
94
-
Several methods exist for configuring a BIG-IP for this scenario,
95
-
including several wizard-based options or an advanced configuration.
96
-
97
-
This tutorial covers the advanced approach, which provides a more
98
-
flexible approach at implementing secure hybrid access by manually creating all BIG-IP configuration objects. You would also use this approach for scenarios not covered by the Guided Configuration.
98
+
Several methods exist for configuring a BIG-IP for this scenario. This tutorial covers the advanced approach, which provides a more
99
+
flexible approach at implementing secure hybrid access by manually creating all BIG-IP configuration objects. You would use this approach for scenarios not covered by the template based Guided Configuration.
99
100
100
101
>[!NOTE]
101
102
>All example strings or values referenced throughout this article should be replaced with those for your actual environment.
@@ -365,11 +366,11 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
365
366
366
367
## Session management
367
368
368
-
A BIG-IPs session management setting are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. You can create your own policy by heading to **Access Policy** > **Access Profiles** and selecting your application from the list.
369
+
A BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. You can create your own policy by heading to **Access Policy** > **Access Profiles** and selecting your application from the list.
369
370
370
-
With regard to SLO functionality, having defined a Single Log-out URI in Azure AD will ensure an IdP initiated sign-out from the MyApps portal also terminates the session between the client and the BIG-IP APM.
371
+
With regard to SLO functionality, having defined a Single Log-Out URI in Azure AD will ensure an IdP initiated sign-out from the MyApps portal also terminates the session between the client and the BIG-IP APM.
371
372
372
-
Having imported the application's federation metadata.xml then provides the APM with the Azure AD SAML log-out endpoint for SP initiated sign-outs. But for this to be truly effective, the APM needs to know exactly when a user signs-out.
373
+
Having imported the application's federation metadata.xml then provides the APM with the Azure AD SAML SLO endpoint for SP initiated sign-outs. But for this to be truly effective, the APM needs to know exactly when a user signs-out.
373
374
374
375
Consider a scenario where a BIG-IP web portal isn't used, the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this, so the application session could easily be reinstated through SSO. For this reason SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required.
375
376
@@ -388,16 +389,12 @@ For increased security, organizations using this pattern could also consider blo
388
389
389
390
## Next steps
390
391
391
-
From a browser, connect to the application's external URL or select the application's icon in the MyApps portal. After authenticating to Azure AD, you'll be redirected to the BIG-IP virtual server for the application and prompted for a password.
392
-
393
-
>[!Note]
394
-
>The APM pre-fills the username with the UPN from Azure AD.
392
+
From a browser, connect to the application's external URL or select the application's icon in the MyApps portal. After authenticating to Azure AD, you’ll be redirected to the BIG-IP endpoint for the application and prompted for a password. Note how the APM pre-fills the username with the UPN from Azure AD. The username pre-populated by the APM is read only to ensure session consistency between Azure AD and backend application. This field could be hidden from view with additional configuration, if necessary.
0 commit comments