Skip to content

Commit ad4874f

Browse files
authored
Merge pull request #189785 from Rainier-MSFT/patch-123
Consistency updates
2 parents f7c0e19 + b758ee6 commit ad4874f

File tree

1 file changed

+8
-27
lines changed

1 file changed

+8
-27
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 8 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -145,38 +145,26 @@ The Easy Button client must also be registered in Azure AD, before it is allowed
145145

146146
## Configure Easy Button
147147

148-
Next, step through the Easy Button configurations to federate and publish the EBS application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
148+
Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
149149

150-
1. From a browser, sign-in to the F5 BIG-IP management console
151-
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
152-
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key
153-
154-
Once provisioned, the certificate can be used for every application published through Easy Button. You can also choose to upload a separate certificate for individual applications.
155-
156-
157-
![Screenshot for Configure Easy Button- Import SSL certificates and keys](./media/f5-big-ip-easy-button-ldap/configure-easy-button.png)
158-
159-
4. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**
160-
161-
You can now access the Easy Button functionality that provides quick configuration steps to set up the APM as a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
150+
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
162151

163152
![Screenshot for Configure Easy Button- Install the template](./media/f5-big-ip-easy-button-ldap/easy-button-template.png)
164153

165-
5. Review the list of configuration steps and select **Next**
154+
2. Review the list of configuration steps and select **Next**
166155

167156
![Screenshot for Configure Easy Button - List configuration steps](./media/f5-big-ip-easy-button-ldap/config-steps.png)
168157

169-
## Configuration steps
158+
3. Follow the sequence of steps required to publish your application.
170159

171-
The **Easy Button** template will display the sequence of steps required to publish your application.
160+
![Configuration steps flow](./media/f5-big-ip-easy-button-ldap/config-steps-flow.png#lightbox)
172161

173-
![Configuration steps flow](./media/f5-big-ip-easy-button-ldap/config-steps-flow.png)
174162

175163
### Configuration Properties
176164

177-
These are general and service account properties. The **Configuration Properties** tab creates up a new application config and SSO object that will be managed through the BIG-IP’s Guided Configuration UI. This configuration can then be reused for publishing more applications through the Easy Button template.
165+
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
178166

179-
Consider the **Azure Service Account Details** be the BIG-IP client application you registered in your Azure AD tenant earlier. This section allows the BIG-IP to programmatically register a SAML application directly in your tenant, along with the other properties you would normally configure manually in the portal. Easy Button will do this for every BIG-IP APM service being published and enabled for SHA.
167+
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
180168

181169
1. Enter a unique **Configuration Name** so admins can easily distinguish between Easy Button configurations.
182170

@@ -198,31 +186,24 @@ The Service Provider settings define the SAML SP properties for the APM instance
198186

199187
![Screenshot for Service Provider settings](./media/f5-big-ip-easy-button-ldap/service-provider.png)
200188

201-
The optional **Security Settings** specify whether Azure AD should encrypt issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides additional assurance that the content tokens can’t be intercepted, and personal or corporate data be compromised.
202-
189+
The optional **Security Settings** specify whether Azure AD should encrypt issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides additional assurance that the content tokens can’t be intercepted, and personal or corporate data be compromised.
203190

204191
3. From the **Assertion Decryption Private Key** list, select **Create New**
205-
206192

207193
![Screenshot for Configure Easy Button- Create New import](./media/f5-big-ip-oracle/configure-security-create-new.png)
208194

209195
4. Select **OK**. This opens the **Import SSL Certificate and Keys** dialog in a new tab
210196

211-
212197
6. Select **PKCS 12 (IIS)** to import your certificate and private key. Once provisioned close the browser tab to return to the main tab.
213198

214-
215199
![Screenshot for Configure Easy Button- Import new cert](./media/f5-big-ip-oracle/import-ssl-certificates-and-keys.png)
216200

217201
6. Check **Enable Encrypted Assertion**.
218202

219-
220203
8. If you have enabled encryption, select your certificate from the **Assertion Decryption Private Key** list. This is the private key for the certificate that BIG-IP APM will use to decrypt Azure AD assertions.
221204

222-
223205
9. If you have enabled encryption, select your certificate from the **Assertion Decryption Certificate** list. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions.
224206

225-
226207
![Screenshot for Service Provider security settings](./media/f5-big-ip-easy-button-ldap/service-provider-security-settings.png)
227208

228209
### Azure Active Directory

0 commit comments

Comments
 (0)