You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md
+16-22Lines changed: 16 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ There are many methods to configure BIG-IP for this scenario, including two temp
100
100
101
101
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](/azure/active-directory/develop/quickstart-register-app)
102
102
103
-
The Easy Button client must also be registered in Azure AD, before it is allowed to establish a trust between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
103
+
This first step creates a tenant app registration that will be used to authorize the **Easy Button** access to Graph. Through these permissions, the BIG-IP will be allowed to push the configurations required to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
104
104
105
105
1. Sign-in to the [Azure AD portal](https://portal.azure.com/) using an account with Application Administrative rights
106
106
@@ -114,8 +114,9 @@ The Easy Button client must also be registered in Azure AD, before it is allowed
114
114
115
115
6. Select **Register** to complete the initial app registration
116
116
117
-
7. Navigate to **API permissions** and authorize the following Microsoft Graph permissions:
117
+
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
118
118
119
+
* Application.Read.All
119
120
* Application.ReadWrite.All
120
121
* Application.ReadWrite.OwnedBy
121
122
* Directory.Read.All
@@ -134,7 +135,7 @@ The Easy Button client must also be registered in Azure AD, before it is allowed
134
135
135
136
## Configure Easy Button
136
137
137
-
Initiate the **Guided Configuration** to launch the **Easy Button** Template.
138
+
Initiate the APM's **Guided Configuration** to launch the **Easy Button** Template.
138
139
139
140
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
140
141
@@ -150,7 +151,7 @@ Initiate the **Guided Configuration** to launch the **Easy Button** Template.
150
151
151
152
### Configuration Properties
152
153
153
-
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IPto programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
154
+
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. Consider the **Azure Service Account Details** section to represent the client you registered in your Azure AD tenant earlier, as an application. These settings allow a BIG-IP's OAuth client to individually register a SAML SP directly in your tenant, along with the SSO properties you would normally configure manually. Easy Button does this for every BIG-IP service being published and enabled for SHA.
154
155
155
156
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
156
157
@@ -166,9 +167,9 @@ Before you select **Next**, confirm the BIG-IP can successfully connect to your
166
167
167
168
### Service Provider
168
169
169
-
The Service Provider settings define the SAML SP properties for the APM instance representing the application protected through SHA.
170
+
The Service Provider settings define the properties for the SAML SP instance of the application protected through SHA.
170
171
171
-
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
172
+
1. Enter **Host**. This is the public FQDN of the application being secured
172
173
173
174
2. Enter **Entity ID.** This is the identifier Azure AD will use to identify the SAML SP requesting a token
174
175
@@ -196,9 +197,7 @@ The optional **Security Settings** specify whether Azure AD should encrypt issue
196
197
197
198
### Azure Active Directory
198
199
199
-
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant.
200
-
201
-
The Easy Button wizard provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP, but you can use the generic SHA template by selecting **F5 BIG-IP APM Azure AD Integration > Add.**
200
+
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant. Easy Button provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. For this scenario select **F5 BIG-IP APM Azure AD Integration > Add.**
202
201
203
202

204
203
@@ -218,7 +217,7 @@ The Easy Button wizard provides a set of pre-defined application templates for O
218
217
219
218

220
219
221
-
7.**User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. **Add** a user or group that you can use later for testing, otherwise all access will be denied
224
223
@@ -269,7 +268,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
269
268
270
269
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
271
270
272
-
4.Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the prerequisites or leave the default if testing
271
+
4.The Client SSL Profile enables the virtual server for HTTPS, so that client connections are encrypted over TLS. Select the **Client SSL Profile** you created as part of the prerequisites or leave the default whilst testing
273
272
274
273

275
274
@@ -310,20 +309,15 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
310
309

311
310
312
311
### Session Management
312
+
The BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and corresponding user info. Refer to [F5's docs](https://support.f5.com/csp/article/K18390492) for details on these settings.
313
313
314
-
The BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. For more details, consult [F5 documentation](https://support.f5.com/csp/article/K18390492).
315
-
316
-
However, this documentation does not cover the Single Log-Out (SLO) functionality, which ensures all sessions between the IdP, the BIG-IP, and the client are terminated after a user has logged out.
317
-
318
-
When the Easy Button wizard deploys a SAML application to Azure AD, it also populates the Logout Url with the APM’s SLO endpoint. That way IdP initiated sign-outs from the MyApps portal also terminates the session between the BIG-IP and a client.
319
-
320
-
During deployment, the SAML applications federation metadata is also imported, providing the APM the SAML logout endpoint for Azure AD. This helps SP initiated sign-outs also terminate the session between a client and Azure AD. But for this to be truly effective, the APM needs to know exactly when a user signs-out.
314
+
What isn’t covered here however is Single Log-Out (SLO) functionality, which ensures all sessions between the IdP, the BIG-IP, and the user agent are terminated as users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it also populates the Logout Url with the APM’s SLO endpoint. That way IdP initiated sign-outs from the Azure AD MyApps portal also terminate the session between the BIG-IP and a client.
321
315
322
-
Consider a scenario where the BIG-IP web portal isn’t used, and the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this, so the application session could easily be reinstated through SSO.
316
+
Along with this the SAML federation metadata for the published application is also imported from your tenant, providing the APM with the SAML logout endpoint for Azure AD. This ensures SP initiated sign outs terminate the session between a client and Azure AD. But for this to be truly effective, the APM needs to know exactly when a user signs-out of the application.
323
317
324
-
For thisreason, SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required. One way of achieving this would be to add an SLO function to your applications sign out button, so that it can redirect your client to the Azure AD SAML sign-out endpoint. The SAML sign-out endpoint for your tenant can be found in **App Registrations > Endpoints.**
318
+
If the BIG-IP webtop portal is used to access published applications then a sign-out from there would be processed by the APM to also call the Azure AD sign-out endpoint. But consider a scenario where the BIG-IP webtop portal isn’t used, then the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this. So for this reason, SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required. One way of achieving this would be to add an SLO function to your applications sign out button, so that it can redirect your client to either the Azure AD SAML or BIG-IP sign-out endpoint. The URL for SAML sign-out endpoint for your tenant can be found in **App Registrations > Endpoints**.
325
319
326
-
If making a change to the app is a no go, then consider having the BIG-IP listen for the apps sign-out call, and upon detecting the request have it trigger SLO. For more information on using BIG-IP iRules to achieve this scenario, refer to F5 knowledge articles[Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145) and [Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
320
+
If making a change to the app is a no go, then consider having the BIG-IP listen for the application's sign-out call, and upon detecting the request have it trigger SLO. Refer to our [Oracle PeopleSoft SLO guidance](/azure/active-directory/manage-apps/f5-big-ip-oracle-peoplesoft-easy-button.md#peoplesoft-single-logout) for using BIG-IP irules to achieve this. More details on using BIG-IP iRules to achieve this is available in the F5 knowledge article[Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145) and [Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
327
321
328
322
## Summary
329
323
@@ -409,7 +403,7 @@ For increased security, organizations using this pattern could also consider blo
409
403
410
404
### Azure AD B2B guest access
411
405
412
-
SHA also supports [Azure AD B2B guest access](../external-identities/hybrid-cloud-to-on-premises.md). Azure AD B2B guest access is also possible by having guest identities flowed down from your Azure AD tenant to the directory that your application. It is necessary to have a local representation of guest objects for BIG-IP to perform KCD SSO to the backend application.
406
+
[Azure AD B2B guest access](../external-identities/hybrid-cloud-to-on-premises.md) is supported for this scenario, by having guest identities flowed down from your Azure AD tenant to the directory the application uses for authorisation. Without a local representation of a guest object in AD, the BIG-IP would fail to recieve a kerberos ticket for KCD SSO to the backend application.
0 commit comments