Skip to content

Commit 9008789

Browse files
authored
Update f5-big-ip-headers-easy-button.md
1 parent 70a60f3 commit 9008789

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ If you can't change the app, enable the BIG-IP to listen for the application sig
314314

315315
Learn more:
316316

317-
* [Oracle PeopleSoft SLO guidance](./f5-big-ip-oracle-peoplesoft-easy-button.md#peoplesoft-single-logout)
317+
* [PeopleSoft Single Logout](./f5-big-ip-oracle-peoplesoft-easy-button.md#peoplesoft-single-logout)
318318
* Go to support.f5.com for:
319319
* [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145)
320320
* [K12056: Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
@@ -383,19 +383,24 @@ BIG-IP logs help isolate issues with connectivity, SSO, policy, or misconfigured
383383

384384
If a BIG-IP error message appears after Azure AD preauthentication, the issue might relate to Azure AD-to-BIG-IP SSO.
385385

386-
1. Navigate to **Access > Overview.
386+
1. Navigate to **Access Policy > Overview**.
387387
2. Select **Access reports**.
388388
3. Run the report for the last hour.
389389
4. Review the logs for clues.
390390

391-
Use the **View session** variables lin, for the session, to help understand if the APM receives expected Azure AD claims.
391+
Use the **View session** variables link, for the session, to help understand if the APM receives expected Azure AD claims.
392392

393393
### No BIG-IP error message
394394

395-
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
395+
If no BIG-IP error message appears, the issue might be related to the back-end request, or BIG-IP-to-application SSO.
396396

397-
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
397+
1. Navigate to **Access Policy > Overview**.
398+
2. Select **Active Sessions**.
399+
3. Select the active session link.
398400

399-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
401+
Use the **View Variables** link to help determine SSO issues, particularly if the BIG-IP APM doesn't obtain correct attributes.
400402

401-
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).
403+
Learn more:
404+
405+
* [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072)
406+
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html)

0 commit comments

Comments
 (0)