You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: active-directory
6
6
ms.subservice: app-mgmt
7
7
ms.topic: how-to
8
8
ms.workload: identity
9
-
ms.date: 03/24/2023
9
+
ms.date: 03/27/2023
10
10
ms.author: gasinh
11
11
ms.collection: M365-identity-device-management
12
12
---
@@ -31,7 +31,7 @@ Learn more:
31
31
32
32
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuraion gates inbound access to the application.
33
33
34
-
Wotj a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
34
+
With a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
35
35
36
36
## Scenario architecture
37
37
@@ -72,7 +72,7 @@ You need the following components:
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
75
-
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php).
75
+
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php)
76
76
* User identities synchronized from an on-premises directory to Azure AD
77
77
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
78
78
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
@@ -94,10 +94,10 @@ BIG-IP registration is the first step for SSO between entities. The app you crea
94
94
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
95
95
2. In the left pane, select the **Azure Active Directory** service.
96
96
3. In the left menu, select **Enterprise applications**.
97
-
4. The **All applications** pane opens
97
+
4. The **All applications** pane opens.
98
98
5. The list of applications in your Azure AD tenant appears.
99
99
6. On the **Enterprise applications** pane, select **New application**.
100
-
7. The **Browse Azure AD Gallery** pane opens
100
+
7. The **Browse Azure AD Gallery** pane opens.
101
101
8. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
102
102
10. In the Azure gallery, search for **F5**.
103
103
11. Select **F5 BIG-IP APM Azure AD integration**.
@@ -119,7 +119,7 @@ Configure the BIG-IP registration to fulfill SAML tokens that BIG-IP APM request
119
119
9. For SP-initiated mode, for **Sign on URL**, enter the application URL.
120
120
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. Then, BIG-IP APM user sessions end when they sign out of Azure AD.
121
121
122
-

122
+

123
123
124
124
> [!NOTE]
125
125
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is `/saml/sp/profile/redirect/slo`.
@@ -216,7 +216,7 @@ Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods
216
216
217
217

218
218
219
-
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO
219
+
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO.
220
220
9. For **Form Action**, leave it blank. Then, the original request URL is used for SSO.
221
221
10. For **Form Parameter for Username**, enter the logon form username field element. Use the browser dev tools to determine the element.
222
222
11. For **Form Parameter for Password**, enter the logon form password field element. Use the browser dev tools to determine the element.
@@ -256,14 +256,14 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
256
256
257
257

258
258
259
-
14. On **SAML authentication SP**, change the **Name** to **Azure AD Auth**
259
+
14. On **SAML authentication SP**, change the **Name** to **Azure AD Auth**.
260
260
15. In the **AAA Server** dropdown, enter the SAML service provider object you created.
261
261
262
262

263
263
264
264
16. On the **Successful** branch, select the **+** sign.
265
265
17. In the pop-up, select **Authentication**.
266
-
18. Select **Logon Page**
266
+
18. Select **Logon Page**.
267
267
19. Select **Add Item**.
268
268
269
269

@@ -286,7 +286,7 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
286
286

287
287
288
288
27. In the upper **Deny** box, select the link.
289
-
28. The **Successful** branch changes to **Allow**
289
+
28. The **Successful** branch changes to **Allow**.
290
290
29. Select **Save**.
291
291
292
292
#### (Optional) configure attribute mappings
@@ -300,18 +300,18 @@ You can add a LogonID_Mapping configuration. Then, the BIG-IP active sessions li
300
300
301
301

302
302
303
-
1. On the **Properties** tab, enter a **Name**. For example, LogonID_Mapping.
304
-
2. Under **Variable Assign**, select **Add new entry**
305
-
3. Select **change**.
303
+
5. On the **Properties** tab, enter a **Name**. For example, LogonID_Mapping.
304
+
6. Under **Variable Assign**, select **Add new entry**.
305
+
7. Select **change**.
306
306
307
307

308
308
309
-
4. For **Custom Variable**, use `session.logon.last.username`.
310
-
5. For Session Variable, user `session.saml.last.identity`.
311
-
6. Select **Finished**.
312
-
7. Select **Save**.
313
-
8. Select **Apply Access Policy**.
314
-
9. Close the Visual Policy Editor.
309
+
8. For **Custom Variable**, use `session.logon.last.username`.
310
+
9. For Session Variable, user `session.saml.last.identity`.
311
+
10. Select **Finished**.
312
+
11. Select **Save**.
313
+
12. Select **Apply Access Policy**.
314
+
13. Close the Visual Policy Editor.
315
315
316
316

317
317
@@ -408,7 +408,7 @@ For increased security, block direct access to the application, enforcing a path
408
408
409
409

410
410
411
-
6. The information is submitted
411
+
6. The information is submitted.
412
412
7. You are signed in to the application.
413
413
414
414

@@ -437,7 +437,7 @@ BIG-IP logs contain information to isolating authentication and SSO issues. Incr
437
437
1. Go to **Access Policy** > **Overview**.
438
438
2. Select **Event Logs**.
439
439
3. Select **Settings**.
440
-
4. Select the row of your published application
440
+
4. Select the row of your published application.
441
441
5. Select **Edit**.
442
442
6. Select **Access System Logs**.
443
443
7. In the SSO list, select **Debug**.
@@ -453,7 +453,7 @@ If a BIG-IP error appears after Azure AD preauthentication, the issue might rela
453
453
454
454
1. Go to **Access** > **Overview**.
455
455
2. Select **Access reports**.
456
-
3. Run the report for the last hour
456
+
3. Run the report for the last hour.
457
457
4. Review the logs for clues.
458
458
459
459
Use the **View session variables** link for your session to determine if the APM receives expected Azure AD claims.
0 commit comments