You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,13 +29,13 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
29
29
30
30
## Scenario description
31
31
32
-
For this scenario, you will configure a critical line of business (LOB) application for**Kerberos authentication**, also known as **Integrated Windows Authentication (IWA)**.
32
+
For this scenario, we have an application using**Kerberos authentication**, also known as **Integrated Windows Authentication (IWA)**, to gate access to protected content.
33
33
34
-
Ideally, Azure AD should manage the application, but being legacy, it does not support any form of modern authentication protocols. Modernization would take considerable effort, introducing inevitable costs, and risk of potential downtime.
34
+
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. Modernizing the app would be ideal, but is costly, requires careful planning, and introduces risk of potential impact.
35
35
36
-
Instead, a BIG-IP Virtual Edition (VE) deployed between the public internet and the internal Azure VNet application is connected and will be used to gate inbound access to the application, along with Azure AD for its extensive choice of authentication and authorization capabilities.
36
+
One option would be to consider using [Azure AD Application Proxy](/azure/active-directory/app-proxy/application-proxy), as it provides the protocol transitioning required to bridge the legacy application to the modern identity control plane. Or for our scenario, we'll achieve this using F5's BIG-IP Application Delivery Controller (ADC).
37
37
38
-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO. It significantly improves the overall security posture of the application, and allows the business to continue operating at pace, without interruption.
38
+
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for remote and local access.
39
39
40
40
## Scenario architecture
41
41
@@ -47,7 +47,7 @@ The SHA solution for this scenario is made up of the following:
47
47
48
48
**KDC:** Key Distribution Center (KDC) role on a Domain Controller (DC), issuing Kerberos tickets.
49
49
50
-
**BIG-IP:** Reverse proxy functionality enables publishing backend applications. The APM then overlays published applications with SAML Service Provider (SP) and SSO functionality.
50
+
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the PeopleSoft service.
51
51
52
52
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
53
53
@@ -179,7 +179,7 @@ These are general and service account properties. Consider this section to be th
179
179
180
180
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
181
181
182
-
1.Enter **Configuration Name.**A unique name that enables an admin to easily distinguish between Easy Button configurations for published applications
182
+
1.Provide a unique **Configuration Name** that enables admins to easily distinguish between Easy Button configurations
183
183
184
184
2. Enable **Single Sign-On (SSO) & HTTP Headers**
185
185
@@ -249,7 +249,7 @@ As our AD infrastructure is based on a .com domain suffix used both, internally
249
249
250
250
#### Additional User Attributes
251
251
252
-
In the **Additional User Attributes tab**, you can enable session augmentation required by various distributed systems such as Oracle, SAP, and other JAVA based implementations requiring attributes stored in other directories. Attributes fetched from an LDAP source can then be injected as additional SSO headers to further control access based on roles, Partner IDs, etc.
255
255
@@ -260,17 +260,17 @@ In the **Additional User Attributes tab**, you can enable session augmentation r
260
260
261
261
You can further protect the published application with policies returned from your Azure AD tenant. These policies are enforced after the first-factor authentication has been completed and uses signals from conditions like device platform, location, user or group membership, or application to determine access.
262
262
263
-
The **Available Policies**list, by default, displays a list of policies that target selected apps.
263
+
The **Available Policies** by default, lists all CA policies defined without user based actions.
264
264
265
-
The **Selected Policies** list, by default, displays all policies targeting All cloud apps. These policies cannot be deselected or moved to the Available Policies list. They are included by default but can be excluded if necessary.
265
+
The **Selected Policies**, by default, displays all policies targeting All cloud apps. These policies cannot be deselected or moved to the Available Policies list.
266
266
267
267
To select a policy to be applied to the application being published:
268
268
269
269
1. Select the desired policy in the **Available Policies** list
270
270
271
271
2. Select the right arrow and move it to the **Selected Policies** list
272
272
273
-
Selected policies should either have an **Include** or **Exclude** option checked. If both options are checked, the selected policy is not enforced. **Exclude** all policies while testing. You can go back and enable them later.
273
+
Selected policies should either have an **Include** or **Exclude** option checked. If both options are checked, the selected policy is not enforced. Excluding all policies may ease testing, you can go back and enable them later.
274
274
275
275

276
276
@@ -293,7 +293,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
293
293
294
294
### Pool Properties
295
295
296
-
The **Application Pool tab** details the services behind a BIG-IP that are represented as a pool, containing one or more application servers.
296
+
The **Application Pool tab** details the services behind a BIG-IP, represented as a pool containing one or more application servers.
297
297
298
298
1. Choose from **Select a Pool.** Create a new pool or select an existing one
299
299
@@ -420,7 +420,7 @@ For more information, see [Kerberos Constrained Delegation across domains](/prev
420
420
421
421
## Next steps
422
422
423
-
From a browser, **connect** to the application’s external URL or select the **application’s icon** in the [Microsoft MyApps portal](https://myapps.microsoft.com/). After authenticating against Azure AD, you’ll be redirected to the BIG-IP virtual server for the application and automatically signed in through SSO.
423
+
From a browser, **connect** to the application’s external URL or select the **application’s icon** in the [Microsoft MyApps portal](https://myapps.microsoft.com/). After authenticating to Azure AD, you’ll be redirected to the BIG-IP virtual server for the application and automatically signed in through SSO.
424
424
425
425

Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-certificate.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,17 +58,27 @@ To secure a custom domain in a TLS binding, the certificate has additional requi
58
58
> [!NOTE]
59
59
> Before creating a free managed certificate, make sure you have [fulfilled the prerequisites](#prerequisites) for your app.
60
60
61
-
The free App Service managed certificate is a turn-key solution for securing your custom DNS name in App Service. It's a TLS/SSL server certificate that's fully managed by App Service and renewed continuously and automatically in six-month increments, 45 days before expiration. You create the certificate and bind it to a custom domain, and let App Service do the rest.
61
+
The free App Service managed certificate is a turn-key solution for securing your custom DNS name in App Service. It's a TLS/SSL server certificate that's fully managed by App Service and renewed continuously and automatically in six-month increments, 45 days before expiration, as long as the prerequisites set-up remain the same without any action required from you. All the associated bindings will be updated with the renewed certificate. You create the certificate and bind it to a custom domain, and let App Service do the rest.
62
62
63
63
The free certificate comes with the following limitations:
64
64
65
65
- Does not support wildcard certificates.
66
66
- Does not support usage as a client certificate by certificate thumbprint (removal of certificate thumbprint is planned).
67
+
- Does not support private DNS.
67
68
- Is not exportable.
68
-
- Is not supported on App Service not publicly accessible.
69
69
- Is not supported on App Service Environment (ASE).
70
+
- Only supports alphanumeric characters, dashes (-), and periods (.).
71
+
72
+
# [Apex domain](#tab/apex)
73
+
- Must have an A record pointing to your web app's IP address.
70
74
- Is not supported with root domains that are integrated with Traffic Manager.
71
-
- If a certificate is for a CNAME-mapped domain, the CNAME must be mapped directly to `<app-name>.azurewebsites.net`.
75
+
- All the above must be met for successful certificate issuances and renewals
76
+
77
+
# [Subdomain](#tab/subdomain)
78
+
- Must have CNAME mapped _directly_ to <app-name>.azurewebsites.net; using services that proxy the CNAME value will block certificate issuance and renewal
79
+
- All the above must be met for successful certificate issuance and renewals
80
+
81
+
-----
72
82
73
83
> [!NOTE]
74
84
> The free certificate is issued by DigiCert. For some domains, you must explicitly allow DigiCert as a certificate issuer by creating a [CAA domain record](https://wikipedia.org/wiki/DNS_Certification_Authority_Authorization) with the value: `0 issue digicert.com`.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ To use managed identity, you must have a premium-tier cache.
93
93
94
94
:::image type="content" source="media/cache-managed-identity/identity-add.png" alt-text="User assigned identity status is on":::
95
95
96
-
1. A sidebar pops up to allow you to select any available user-assigned identity to your subscription. Choose an identity and select **Add**. For more information on user assigned managed identities, see [manage user-assigned identity](/azure/active-directory/managed-identities-azure-resources/manage-user-assigned-managed-identities.md).
96
+
1. A sidebar pops up to allow you to select any available user-assigned identity to your subscription. Choose an identity and select **Add**. For more information on user assigned managed identities, see [manage user-assigned identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
97
97
>[!Note]
98
98
>You need to [create a user assigned identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp) in advance of this step.
@@ -161,16 +163,14 @@ In the web app initializer such as Global.asax.cs:
161
163
For [ASP.NET Core](asp-net-core.md#adding-telemetryinitializers) applications, adding a new `TelemetryInitializer` is done by adding it to the Dependency Injection container, as shown below. This is done in `ConfigureServices` method of your `Startup.cs` class.
0 commit comments