Skip to content

Commit c3e1de0

Browse files
authored
Update f5-big-ip-forms-advanced.md
1 parent d974998 commit c3e1de0

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: active-directory
66
ms.subservice: app-mgmt
77
ms.topic: how-to
88
ms.workload: identity
9-
ms.date: 03/24/2023
9+
ms.date: 03/27/2023
1010
ms.author: gasinh
1111
ms.collection: M365-identity-device-management
1212
---
@@ -31,7 +31,7 @@ Learn more:
3131

3232
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuraion gates inbound access to the application.
3333

34-
Wotj a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
34+
With a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
3535

3636
## Scenario architecture
3737

@@ -72,7 +72,7 @@ You need the following components:
7272
* F5 BIG-IP® Best bundle
7373
* F5 BIG-IP Access Policy Manager™ (APM) standalone license
7474
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
75-
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php).
75+
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php)
7676
* User identities synchronized from an on-premises directory to Azure AD
7777
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
7878
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
@@ -94,10 +94,10 @@ BIG-IP registration is the first step for SSO between entities. The app you crea
9494
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
9595
2. In the left pane, select the **Azure Active Directory** service.
9696
3. In the left menu, select **Enterprise applications**.
97-
4. The **All applications** pane opens
97+
4. The **All applications** pane opens.
9898
5. The list of applications in your Azure AD tenant appears.
9999
6. On the **Enterprise applications** pane, select **New application**.
100-
7. The **Browse Azure AD Gallery** pane opens
100+
7. The **Browse Azure AD Gallery** pane opens.
101101
8. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
102102
10. In the Azure gallery, search for **F5**.
103103
11. Select **F5 BIG-IP APM Azure AD integration**.
@@ -119,7 +119,7 @@ Configure the BIG-IP registration to fulfill SAML tokens that BIG-IP APM request
119119
9. For SP-initiated mode, for **Sign on URL**, enter the application URL.
120120
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. Then, BIG-IP APM user sessions end when they sign out of Azure AD.
121121

122-
![Screenshot of URLs in Basic SAML Configuration.](./media/f5-big-ip-forms-advanced/basic-saml-configuration.png)
122+
![Screenshot of URLs in the SAML configuration.](./media/f5-big-ip-forms-advanced/basic-saml-configuration.png)
123123

124124
> [!NOTE]
125125
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is `/saml/sp/profile/redirect/slo`.
@@ -216,7 +216,7 @@ Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods
216216

217217
![Screenshot of Name and Use SSO Template options under New SSO Configuration.](./media/f5-big-ip-forms-advanced/new-sso-configuration.png)
218218

219-
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO
219+
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO.
220220
9. For **Form Action**, leave it blank. Then, the original request URL is used for SSO.
221221
10. For **Form Parameter for Username**, enter the logon form username field element. Use the browser dev tools to determine the element.
222222
11. For **Form Parameter for Password**, enter the logon form password field element. Use the browser dev tools to determine the element.
@@ -256,14 +256,14 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
256256

257257
![Screenshot of the SAML Auth option.](./media/f5-big-ip-forms-advanced/saml-auth-add-item.png)
258258

259-
14. On **SAML authentication SP**, change the **Name** to **Azure AD Auth**
259+
14. On **SAML authentication SP**, change the **Name** to **Azure AD Auth**.
260260
15. In the **AAA Server** dropdown, enter the SAML service provider object you created.
261261

262262
![Screenshot showing the Azure AD Authentication server settings.](./media/f5-big-ip-forms-advanced/azure-ad-auth-server.png)
263263

264264
16. On the **Successful** branch, select the **+** sign.
265265
17. In the pop-up, select **Authentication**.
266-
18. Select **Logon Page**
266+
18. Select **Logon Page**.
267267
19. Select **Add Item**.
268268

269269
![Screenshot of the Logon Page option on the Logon tab.](./media/f5-big-ip-forms-advanced/logon-page.png)
@@ -286,7 +286,7 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
286286
![Screenshot of the Save option on the Properties tab.](./media/f5-big-ip-forms-advanced/save-sso-credential-mapping.png)
287287

288288
27. In the upper **Deny** box, select the link.
289-
28. The **Successful** branch changes to **Allow**
289+
28. The **Successful** branch changes to **Allow**.
290290
29. Select **Save**.
291291

292292
#### (Optional) configure attribute mappings
@@ -300,18 +300,18 @@ You can add a LogonID_Mapping configuration. Then, the BIG-IP active sessions li
300300

301301
![Screenshot of the Variable Assign option on the Assignment tab.](./media/f5-big-ip-forms-advanced/variable-assign.png)
302302

303-
1. On the **Properties** tab, enter a **Name**. For example, LogonID_Mapping.
304-
2. Under **Variable Assign**, select **Add new entry**
305-
3. Select **change**.
303+
5. On the **Properties** tab, enter a **Name**. For example, LogonID_Mapping.
304+
6. Under **Variable Assign**, select **Add new entry**.
305+
7. Select **change**.
306306

307307
![Screenshot of the Add new entry option and the change option.](./media/f5-big-ip-forms-advanced/add-new-entry.png)
308308

309-
4. For **Custom Variable**, use `session.logon.last.username`.
310-
5. For Session Variable, user `session.saml.last.identity`.
311-
6. Select **Finished**.
312-
7. Select **Save**.
313-
8. Select **Apply Access Policy**.
314-
9. Close the Visual Policy Editor.
309+
8. For **Custom Variable**, use `session.logon.last.username`.
310+
9. For Session Variable, user `session.saml.last.identity`.
311+
10. Select **Finished**.
312+
11. Select **Save**.
313+
12. Select **Apply Access Policy**.
314+
13. Close the Visual Policy Editor.
315315

316316
![Screenshot of of the access policy on Apply Access Policy.](./media/f5-big-ip-forms-advanced/apply-access-policy.png)
317317

@@ -408,7 +408,7 @@ For increased security, block direct access to the application, enforcing a path
408408

409409
![Screenshot of the sign in page.](./media/f5-big-ip-forms-advanced/secured-sso.png)
410410

411-
6. The information is submitted
411+
6. The information is submitted.
412412
7. You are signed in to the application.
413413

414414
![Screenshot of Welcome page.](./media/f5-big-ip-forms-advanced/welcome-message.png)
@@ -437,7 +437,7 @@ BIG-IP logs contain information to isolating authentication and SSO issues. Incr
437437
1. Go to **Access Policy** > **Overview**.
438438
2. Select **Event Logs**.
439439
3. Select **Settings**.
440-
4. Select the row of your published application
440+
4. Select the row of your published application.
441441
5. Select **Edit**.
442442
6. Select **Access System Logs**.
443443
7. In the SSO list, select **Debug**.
@@ -453,7 +453,7 @@ If a BIG-IP error appears after Azure AD preauthentication, the issue might rela
453453

454454
1. Go to **Access** > **Overview**.
455455
2. Select **Access reports**.
456-
3. Run the report for the last hour
456+
3. Run the report for the last hour.
457457
4. Review the logs for clues.
458458

459459
Use the **View session variables** link for your session to determine if the APM receives expected Azure AD claims.

0 commit comments

Comments
 (0)