You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md
+34-52Lines changed: 34 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 11/16/2022
11
+
ms.date: 12/14/2022
12
12
ms.author: gasinh
13
13
ms.collection: M365-identity-device-management
14
14
---
@@ -41,19 +41,14 @@ A BIG-IP in front of the application enables overlay of the service with Azure A
41
41
42
42
The secure hybrid access (SHA) solution for this scenario has the following components:
43
43
44
-
**Application:** BIG-IP published service to be protected by Azure AD SHA. The application host is domain-joined, therefore is integrated with Active Directory (AD).
45
-
46
-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verifying user credentials, Conditional Access (CA), and SAML-based SSO to the BIG-IP. Through SSO, Azure AD provides BIG-IP with required session attributes.
47
-
48
-
**KDC:** Key Distribution Center (KDC) role on a Domain Controller (DC), issuing Kerberos tickets
49
-
50
-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing Kerberos-based SSO to the back-end application.
44
+
***Application:** BIG-IP published service to be protected by Azure AD SHA. The application host is domain-joined, therefore is integrated with Active Directory (AD).
45
+
***Azure AD:** Security Assertion Markup Language (SAML) identity provider (IdP) that verifies user credentials, Conditional Access (CA), and SAML-based SSO to the BIG-IP. Through SSO, Azure AD provides BIG-IP with required session attributes.
46
+
***KDC:** Key Distribution Center (KDC) role on a Domain Controller (DC), issuing Kerberos tickets
47
+
***BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing Kerberos-based SSO to the back-end application.
51
48
52
49
SHA for this scenario supports SP- and IdP-initiated flows. The following image illustrates the SP flow.
* User identities [synchronized](../hybrid/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD, or created in Azure AD and flowed back to your on-premises directory
85
-
86
-
* An account with Azure AD Application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
87
-
88
-
* An [SSL Web certificate](./f5-bigip-deployment-guide.md) for publishing services over HTTPS, or use default BIG-IP certificates while testing
89
-
73
+
* An account with Azure AD Application Admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
74
+
* An [SSL Web certificate](./f5-bigip-deployment-guide.md) for publishing services over HTTPS, or use the default BIG-IP certificates while testing
90
75
* A Kerberos application, or go to active-directory-wp.com to learn to configure [SSO with IIS on Windows](https://active-directory-wp.com/docs/Networking/Single_Sign_On/SSO_with_IIS_on_Windows.html).
91
76
92
77
## BIG-IP configuration methods
93
78
94
79
This tutorial covers the latest Guided Configuration 16.1 with an Easy Button template. With the Easy Button, Admins don't go back and forth between Azure AD and a BIG-IP to enable services for SHA. The deployment and policy management is handled by the APM Guided Configuration wizard and Microsoft Graph. This integration between BIG-IP APM and Azure AD ensures applications support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
95
80
96
81
>[!NOTE]
97
-
> Example strings or values in this article should be replaced with those for your actual environment.
82
+
> Replace example strings or values in this article with those for your environment.
98
83
99
84
## Register Easy Button
100
85
101
86
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](../develop/quickstart-register-app.md). This action creates a tenant app registration to authorize Easy Button access to Graph. Through these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
102
87
103
-
1. Sign in to the [Azure AD portal](https://portal.azure.com/) using an account with Application Administrative rights.
88
+
1. Sign in to the [Azure portal](https://portal.azure.com/) using an account with Application Admin permissions.
104
89
2. From the left navigation pane, select the **Azure Active Directory** service.
105
90
3. Under Manage, select **App registrations > New registration**.
106
91
4. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
@@ -129,15 +114,15 @@ Initiate the APM Guided Configuration to launch the Easy Button template.
129
114
130
115
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
131
116
132
-

117
+

133
118
134
119
2. Review the configuration steps and select **Next**
135
120
136
-

121
+

3. Enter the **Tenant ID**, **Client ID**, and **Client Secret** you noted when registering the Easy Button client in your tenant.
151
136
152
-

137
+

153
138
154
139
4. Confirm the BIG-IP connects to your tenant.
155
140
5. Select **Next**.
@@ -161,64 +146,64 @@ The Service Provider settings are the properties for the SAML SP instance of the
161
146
1. For **Host**, enter the public FQDN of the application being secured.
162
147
2. For **Entity ID**, enter the identifier Azure AD uses to identify the SAML SP requesting a token.
163
148
164
-

149
+

165
150
166
151
The optional **Security Settings** specify whether Azure AD encrypts issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides more assurance the content tokens can’t be intercepted, and personal or corporate data can't be compromised.
167
152
168
153
3. From the **Assertion Decryption Private Key** list, select **Create New**.
169
154
170
-

155
+

171
156
172
157
4. Select **OK**. The **Import SSL Certificate and Keys** dialog appears.
173
158
5. Select **PKCS 12 (IIS)** to import your certificate and private key.
174
159
6. After provisioning, close the browser tab to return to the main tab.
175
160
176
-

161
+

177
162
178
163
7. Check **Enable Encrypted Assertion**.
179
164
8. If you enabled encryption, select your certificate from the **Assertion Decryption Private Key** list. This private key is for the certificate that BIG-IP APM uses to decrypt Azure AD assertions.
180
165
9. If you enabled encryption, select your certificate from the **Assertion Decryption Certificate** list. BIG-IP uploads this certificate to Azure AD to encrypt the issued SAML assertions.
181
166
182
-

167
+

183
168
184
169
### Azure Active Directory
185
170
186
171
This section defines properties to manually configure a new BIG-IP SAML application in your Azure AD tenant. Easy Button has application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP, and an SHA template for other apps.
187
172
188
173
For this scenario, select **F5 BIG-IP APM Azure AD Integration > Add.**
189
174
190
-

175
+

191
176
192
177
#### Azure Configuration
193
178
194
179
1. Enter a **Display Name** for the app that BIG-IP creates in your Azure AD tenant, and the icon in [MyApps portal](https://myapplications.microsoft.com/).
195
180
2. Leave the **Sign On URL** (optional) blank to enable IdP initiated sign-on.
196
181
197
-

182
+

198
183
199
184
3. Select the **refresh** icon next to the **Signing Key** and **Signing Certificate** to locate the certificate you imported.
200
185
4. In **Signing Key Passphrase**, enter the certificate password.
201
186
5. Enable **Signing Option** (optional) to ensure BIG-IP accepts tokens and claims signed by Azure AD.
202
187
203
-

188
+

204
189
205
190
6.**User and User Groups** are dynamically queried from your Azure AD tenant and authorize access to the application. Add a user or group for testing, otherwise all access is denied.
206
191
207
-

192
+

208
193
209
194
#### User Attributes & Claims
210
195
211
196
When a user authenticates to Azure AD, it issues a SAML token with a default set of claims and attributes identifying the user. The **User Attributes & Claims** tab shows the default claims to issue for the new application. Use it to configure more claims.
212
197
213
198
The AD infrastructure is based on a .com domain suffix used internally and externally. More attributes aren't required to achieve a functional KCD SSO implementation. See the [advanced tutorial](./f5-big-ip-kerberos-advanced.md) for multiple domains or user sign-in using an alternate suffix.
214
199
215
-

200
+

216
201
217
202
#### Additional User Attributes
218
203
219
204
The **Additional User Attributes** tab supports various distributed systems requiring attributes stored in other directories, for session augmentation. Attributes fetched from an LDAP source can be injected as SSO headers to help control access based on roles, Partner IDs, etc.
220
205
221
-

206
+

222
207
223
208
>[!NOTE]
224
209
>This feature has no correlation to Azure AD but is another source of attributes.
@@ -238,7 +223,7 @@ To select a policy to apply to the application being published:
238
223
239
224
Selected policies need an **Include** or **Exclude** option checked. If both options are checked, the selected policy isn't enforced.
240
225
241
-

226
+

242
227
243
228
>[!NOTE]
244
229
>The policy list appears once, after switching to this tab. You can use the **refresh** button to manually force the wizard to query your tenant, but this button appears after the application is deployed.
@@ -252,7 +237,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
252
237
3. Check **Enable Redirect Port** and then enter **Redirect Port**, which redirects incoming HTTP client traffic to HTTPS.
253
238
4. The Client SSL Profile enables the virtual server for HTTPS, so client connections are encrypted over TLS. Select the **Client SSL Profile** you created for prerequisites, or leave the default if you're testing.
254
239
255
-

240
+

256
241
257
242
### Pool Properties
258
243
@@ -262,7 +247,7 @@ The **Application Pool** tab shows the services behind a BIG-IP, represented as
262
247
2. Choose a **Load Balancing Method**, such as Round Robin.
263
248
3. For **Pool Servers** select a server node, or specify an IP and port for the back-end node hosting the header-based application.
264
249
265
-

250
+

266
251
267
252
The back-end application runs on HTTP port 80. You can switch the port to 443, if your application runs on HTTPS.
268
253
@@ -276,17 +261,14 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
276
261
277
262
***User Realm Source:** Required if the user domain differs from the BIG-IP Kerberos realm. In that case, the APM session variable contains the logged-in user domain. For example,*session.saml.last.attr.name.domain*
278
263
279
-

280
-
281
-
***KDC:** IP of a Domain Controller, or FQDN if DNS is configured and efficient
264
+

282
265
266
+
***KDC:** Domain Controller IP, or FQDN if DNS is configured and efficient
283
267
***UPN Support:** Enable this option for the APM to use the UPN for Kerberos ticketing
284
-
285
268
***SPN Pattern:** Use HTTP/%h to inform the APM to use the host header of the client request, and build the SPN for which it's requesting a Kerberos token
286
-
287
269
***Send Authorization:** Disable for applications that negotiate authentication instead of receiving the kerberos token in the first request. For example, Tomcat.
288
270
289
-

271
+

290
272
291
273
### Session Management
292
274
@@ -388,7 +370,7 @@ For more information, see [Kerberos Constrained Delegation across domains](/prev
388
370
389
371
From a browser, connect to the application external URL or select the **application** icon in the [Microsoft MyApps portal](https://myapps.microsoft.com/). After authenticating to Azure AD, you're redirected to the BIG-IP virtual server for the application and signed in through SSO.
390
372
391
-

373
+

392
374
393
375
For increased security, organizations using this pattern can block direct access to the application, thereby forcing a strict path through the BIG-IP.
394
376
@@ -404,7 +386,7 @@ Alternatively, in BIG-IP you can disable the Guided Configuration strict managem
404
386
405
387
You can navigate to **Access > Guided Configuration** and select the small **padlock** icon on the far-right of the row for your applications configs.
406
388
407
-

389
+

408
390
409
391
At this point, changes with the wizard UI aren't possible, but all BIG-IP objects associated with the published instance of the application are unlocked for management.
410
392
@@ -443,7 +425,7 @@ If a BIG-IP error appears after Azure AD pre-authentication, the issue might rel
443
425
444
426
If no error page appears, the issue is probably related to the back-end request, or SSO from the BIG-IP to the application.
445
427
446
-
1. Navigate to **Access Policy > Overview > Active Sessions**.\
428
+
1. Navigate to **Access Policy > Overview > Active Sessions**.
447
429
2. Select the link for your active session. The **View Variables** link in this location can help determine root cause KCD issues, particularly if the BIG-IP APM fails to obtain the right user and domain identifiers from session variables.
0 commit comments