You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.date: 03/20/2023
15
15
16
16
# Tutorial: Enable secure hybrid access for applications with Azure Active Directory B2C and F5 BIG-IP
17
17
18
-
Learn to integrate Azure Active Directory B2C (Azure AD B2C) with F5 BIG-IP Access Policy Manager (APM). You can expose legacy applications securely to the internet through BIG-IP security, with Azure AD B2C pre-authentication, Conditional Access (CA), and single sign-on (SSO). F5 Inc. focuses on delivery, security, performance, and availability of connected services, including computing, storage, and network resources. It provides hardware, modularized software, and cloud-ready virtual appliance solutions.
18
+
Learn to integrate Azure Active Directory B2C (Azure AD B2C) with F5 BIG-IP Access Policy Manager (APM). You can expose legacy applications securely to the internet through BIG-IP security, with Azure AD B2C preauthentication, Conditional Access (CA), and single sign-on (SSO). F5 Inc. focuses on delivery, security, performance, and availability of connected services, including computing, storage, and network resources. It provides hardware, modularized software, and cloud-ready virtual appliance solutions.
19
19
20
20
Deploy F5 BIG-IP Application Delivery Controller (ADC) as a secure gateway between private networks and the internet. There are features for application-level inspection and customizable access controls. If deployed as a reverse proxy, use the BIG-IP to enable secure hybrid access to business applications, with a federated identity access layer managed by APM.
21
21
@@ -47,7 +47,7 @@ The following scenario is header-based, but you can use these methods to achieve
47
47
48
48
For this scenario, access for an internal application relies on receiving HTTP authorization headers from a legacy broker system. Sales agents can be directed to respective areas of content. The service needs to be expanded to a broader consumer base. The application gets upgraded for consumer authentication options, or gets replaced.
49
49
50
-
Ideally, an application upgrade supports direct management and governance with a modern control plane. However, time and effort to modernize introduces costs and potential downtime. Instead, deploy a BIG-IP Virtual Edition (VE) between the public internet and the internal Azure virtual network (VNet) to gate access with Azure AD B2C. BIG-IP in front of the application enables overlay of the service with Azure AD B2C pre-authentication and header-based SSO, improving the app security posture.
50
+
Ideally, an application upgrade supports direct management and governance with a modern control plane. However, time and effort to modernize introduces costs and potential downtime. Instead, deploy a BIG-IP Virtual Edition (VE) between the public internet and the internal Azure virtual network (VNet) to gate access with Azure AD B2C. BIG-IP in front of the application enables overlay of the service with Azure AD B2C preauthentication and header-based SSO, improving the app security posture.
51
51
52
52
The secure hybrid access solution has of the following components:
53
53
@@ -116,7 +116,7 @@ Federate BIG-IP and Azure AD B2C for mutual trust. Register the BIG-IP in the Az
116
116
11. Enter a TTL for the secret used by the BIG-IP.
117
117
12. Note the Client Secret for BIG-IP configuration.
118
118
119
-
The redirect URI is the BIG-IP endpoint. Users are sent to the endpoint by the authorization server (Azure AD B2C), after authentication.
119
+
The redirect URI is the BIG-IP endpoint. After authentication, the authorization server (Azure AD B2C) sends users to the endpoint.
120
120
121
121
Learn more: [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md) for Azure AD B2C.
122
122
@@ -148,7 +148,7 @@ To add and manage certificates in the BIG-IP VE, go to techdocs.f5.com for [BIG-
148
148
149
149
### OAuth properties
150
150
151
-
In the following sections you define properties to enable federation between the BIG-IP APM and the OAuth authorization server, the Azure AD B2C tenant. OAuth is referred to throughout BIG-IP configuration. The solution uses OIDC, an identity layer on the OAuth 2.0 protocol. OIDC clients verify user identity and obtain other profile information.
151
+
In the following sections, define properties to enable federation between the BIG-IP APM and the OAuth authorization server, the Azure AD B2C tenant. OAuth is referred to throughout BIG-IP configuration. The solution uses OIDC, an identity layer on the OAuth 2.0 protocol. OIDC clients verify user identity and obtain other profile information.
152
152
153
153
#### Configuration name
154
154
@@ -181,7 +181,7 @@ Add a new provider and configure it:
181
181
182
182
| Properties | Description |
183
183
|:-----------|:----------------|
184
-
| Scope | Leave blank, the OpenID scope for user sign-in will is added automatically |
184
+
| Scope | Leave blank. The OpenID scope for user sign-in is added automatically |
185
185
| Grant type | Authorization code |
186
186
| Enable OpenID Connect | Select the option to put the APM OAuth client in OIDC mode |
187
187
| Flow type | Authorization code |
@@ -201,7 +201,7 @@ The following OpenID URI refers to the metadata endpoint used by OIDC clients to
201
201
| Audience | The application client ID representing the BIG-IP in the Azure AD B2C tenant |
202
202
| Authentication URI | The authorization endpoint in your B2C OIDC metadata |
203
203
| Token URI | The token endpoint in your Azure AD B2C metadata |
204
-
| Userinfo request URI | Leave empty. Azure AD B2C does not support this feature |
204
+
| Userinfo request URI | Leave empty. Azure AD B2C doesn't support this feature |
205
205
|OpenID URI | The OpenID URI metadata endpoint you created |
@@ -220,7 +220,7 @@ For the OIDC authorization server, being your Azure AD B2C tenant.
220
220
221
221
**OAuth request settings**
222
222
223
-
The BIG-IP has required Azure AD B2C requests in its pre-configured request set. However, the requests were malformed, and missing important parameters. So, we created them manually.
223
+
The BIG-IP has required Azure AD B2C requests in its preconfigured request set. However, the requests were malformed, and missing important parameters. So, we created them manually.
224
224
225
225
**Token request: Enabled**
226
226
@@ -314,7 +314,7 @@ In the **Form Header** text field, replace the `F5 Networks` string with a name
314
314
315
315
**Session management properties**
316
316
317
-
Use the BIG-IP session management settings to define conditions that terminate sessionsor allowed them to continue. Set limits for users and IP addresses, and error pages. We recommend implementing single log out (SLO), which terminates sessions securely, reducing risks of unauthorized access.
317
+
Use the BIG-IP session management settings to define conditions that terminate sessions or allow them to continue. Set limits for users and IP addresses, and error pages. We recommend implementing single log out (SLO), which terminates sessions securely, reducing risks of unauthorized access.
318
318
319
319
## Deploy settings
320
320
@@ -326,7 +326,7 @@ Learn more: [Identity Protection and Conditional Access for Azure AD B2C](condit
326
326
327
327
1. As a user, go to the application external URL.
328
328
2. The BIG-IP’s OAuth client sign-in page appears.
329
-
3. Sign in using the authorization code grant. To removing this step, see the **Supplemental configurations** section.
329
+
3. Sign in using the authorization code grant. To remove this step, see the **Supplemental configurations** section.
330
330
4. Sign up and authenticate against your Azure AD B2C tenant.
331
331
332
332
The following images are the user sign in dialog and the sign-in welcome page.
@@ -341,16 +341,16 @@ For increased security, block direct access to the application, thereby enforcin
341
341
342
342
**Single log-out (SLO)**
343
343
344
-
Azure AD B2C supports identity provider (IdP) and application signout. See, [Single sign-out](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
344
+
Azure AD B2C supports identity provider (IdP) and application sign-out. See, [Single signout](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
345
345
346
-
To achieve SLO, enable your application sign-out function to call the Azure AD B2C log-out endpoint. Then, Azure AD B2C issues a final redirect to the BIG-IP. This action ensures the user-application APM session terminates.
346
+
To achieve SLO, enable your application signout function to call the Azure AD B2C sign-out endpoint. Then, Azure AD B2C issues a final redirect to the BIG-IP. This action ensures the user-application APM session terminates.
347
347
348
-
An alternative SLO process is to enable the BIG-IP to listen for the request, when selecting the applications **Sign out** button. Upon detecting the request it calls to the Azure AD B2C log-off endpoint. This approach precludes making changes to the application.
348
+
An alternative SLO process is to enable the BIG-IP to listen for the request, when selecting the applications **Sign out** button. Upon detecting the request, it calls to the Azure AD B2C sign-off endpoint. This approach precludes making changes to the application.
349
349
350
350
To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145).
351
351
352
352
> [!NOTE]
353
-
> Regardless of approach, ensure the Azure AD B2C tenant knows the APM log-out endpoint.
353
+
> Regardless of approach, ensure the Azure AD B2C tenant knows the APM sign-out endpoint.
354
354
355
355
1. In the portal, navigate to **Manage** > **Manifest**.
356
356
2. Locate the `logoutUrl` property. It reads null.
@@ -361,7 +361,7 @@ To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring au
361
361
362
362
**Optimized login flow**
363
363
364
-
To improving the user sign-in experience, suppress the OAuth user sign-in prompt displayed before Azure AD pre-authentication.
364
+
To improve the user sign-in experience, suppress the OAuth user sign-in prompt that appears before Azure AD preauthentication.
365
365
366
366
1. Navigate to **Access** > **Guided Configuration**.
367
367
2. On the far right of the row, select the **padlock** icon.
@@ -372,7 +372,7 @@ To improving the user sign-in experience, suppress the OAuth user sign-in prompt
372
372
Unlocking the strict configuration prevents changes with the wizard UI. BIG-IP objects are associated with the published instance of the application, and are open for direct management.
0 commit comments