You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md
+8-27Lines changed: 8 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,38 +145,26 @@ The Easy Button client must also be registered in Azure AD, before it is allowed
145
145
146
146
## Configure Easy Button
147
147
148
-
Next, step through the Easy Button configurations to federate and publish the EBS application. Start by provisioning your BIG-IP with an X509 certificate that Azure AD can use to sign SAML tokens and claims issued for SHA enabled services.
148
+
Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
149
149
150
-
1. From a browser, sign-in to the F5 BIG-IP management console
151
-
2. Navigate to **System > Certificate Management > Traffic Certificate Management SSL Certificate List > Import**
152
-
3. Select **PKCS 12 (IIS)** and import your certificate along with its private key
153
-
154
-
Once provisioned, the certificate can be used for every application published through Easy Button. You can also choose to upload a separate certificate for individual applications.
155
-
156
-
157
-

158
-
159
-
4. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**
160
-
161
-
You can now access the Easy Button functionality that provides quick configuration steps to set up the APM as a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
150
+
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
162
151
163
152

164
153
165
-
5. Review the list of configuration steps and select **Next**
154
+
2. Review the list of configuration steps and select **Next**
166
155
167
156

168
157
169
-
## Configuration steps
158
+
3. Follow the sequence of steps required to publish your application.
170
159
171
-
The **Easy Button** template will display the sequence of steps required to publish your application.
These are general and service account properties. The **Configuration Properties** tab creates up a new application config and SSO object that will be managed through the BIG-IP’s Guided Configuration UI. This configuration can then be reused for publishing more applications through the Easy Button template.
165
+
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
178
166
179
-
Consider the **Azure Service Account Details** be the BIG-IP client application you registered in your Azure AD tenant earlier. This section allows the BIG-IP to programmatically register a SAML application directly in your tenant, along with the other properties you would normally configure manually in the portal. Easy Button will do this for every BIG-IP APM service being published and enabled for SHA.
167
+
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
180
168
181
169
1. Enter a unique **Configuration Name** so admins can easily distinguish between Easy Button configurations.
182
170
@@ -198,31 +186,24 @@ The Service Provider settings define the SAML SP properties for the APM instance
198
186
199
187

200
188
201
-
The optional **Security Settings** specify whether Azure AD should encrypt issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides additional assurance that the content tokens can’t be intercepted, and personal or corporate data be compromised.
202
-
189
+
The optional **Security Settings** specify whether Azure AD should encrypt issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides additional assurance that the content tokens can’t be intercepted, and personal or corporate data be compromised.
203
190
204
191
3. From the **Assertion Decryption Private Key** list, select **Create New**
205
-
206
192
207
193

208
194
209
195
4. Select **OK**. This opens the **Import SSL Certificate and Keys** dialog in a new tab
210
196
211
-
212
197
6. Select **PKCS 12 (IIS)** to import your certificate and private key. Once provisioned close the browser tab to return to the main tab.
213
198
214
-
215
199

216
200
217
201
6. Check **Enable Encrypted Assertion**.
218
202
219
-
220
203
8. If you have enabled encryption, select your certificate from the **Assertion Decryption Private Key** list. This is the private key for the certificate that BIG-IP APM will use to decrypt Azure AD assertions.
221
204
222
-
223
205
9. If you have enabled encryption, select your certificate from the **Assertion Decryption Certificate** list. This is the certificate that BIG-IP will upload to Azure AD for encrypting the issued SAML assertions.
224
206
225
-
226
207

0 commit comments