Skip to content

Commit c7679f0

Browse files
authored
Merge pull request #187649 from Rainier-MSFT/patch-127
Tweaks
2 parents 3096ed9 + 6e734ca commit c7679f0

File tree

1 file changed

+15
-17
lines changed

1 file changed

+15
-17
lines changed

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ Having Azure AD pre-authenticate access to BIG-IP published services provides ma
2828

2929
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
3030

31-
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive control through user and session risk profiling
32-
33-
- [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
31+
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive protection through user and session risk profiling, plus [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
3432

3533
- [Self-service password reset (SSPR)](../authentication/tutorial-enable-sspr.md)
3634

@@ -77,15 +75,15 @@ Whether a direct employee, affiliate, or consumer, most users are already acquai
7775

7876
Users now find their BIG-IP published services consolidated in the [MyApps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510) or [O365 launchpads](https://airhead.io/airbase/launchpads/R3kW-RkDFEedipcU1AFlnA) along with self-service capabilities to a broader set of services, no matter the type of device or location. Users can even continue accessing published services directly via the BIG-IPs proprietary Webtop portal, if preferred. When logging off, SHA ensures a users’ session is terminated at both ends, the BIG-IP and Azure AD, ensuring services remain fully protected from unauthorized access.
7977

80-
The screenshots provided are from the Azure AD app portal that users access securely to find their BIG-IP published services and for managing their account properties.
78+
Users access the Microsoft MyApps portal to easily find their BIG-IP published services and for managing their account properties.
8179

8280
![The screenshot shows woodgrove myapps gallery](media/f5-aad-integration/woodgrove-app-gallery.png)
8381

8482
![The screenshot shows woodgrove myaccounts self-service page](media/f5-aad-integration/woodgrove-myaccount.png)
8583

8684
## Insights and analytics
8785

88-
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances should be monitored to ensure published services are highly available, both at an SHA level and operationally too.
86+
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances can be monitored to ensure published services are highly available, both at an SHA level and operationally too.
8987

9088
Several options exist for logging events either locally, or remotely through a Security Information and Event Management (SIEM) solution, enabling off-box storage and processing of telemetry. A highly effective solution for monitoring Azure AD and SHA-specific activity, is to use [Azure Monitor](../../azure-monitor/overview.md) and [Microsoft Sentinel](../../sentinel/overview.md), together offering:
9189

@@ -97,7 +95,7 @@ Several options exist for logging events either locally, or remotely through a S
9795

9896
## Prerequisites
9997

100-
Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
98+
Integrating an F5 BIG-IP with Azure AD for SHA has the following pre-requisites:
10199

102100
- An F5 BIG-IP instance running on either of the following platforms:
103101

@@ -111,13 +109,13 @@ Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
111109

112110
- An active F5 BIG-IP APM license, through one of the following options:
113111

114-
- F5 BIG-IP® Best bundle (or)
112+
- F5 BIG-IP® Best bundle
115113

116-
- F5 BIG-IP Access Policy Manager™ standalone license
114+
- F5 BIG-IP Access Policy Manager™ standalone license
117115

118-
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
116+
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
119117

120-
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
118+
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
121119

122120
- Azure AD licensing through either of the following options:
123121

@@ -130,7 +128,7 @@ No previous experience or F5 BIG-IP knowledge is necessary to implement SHA, but
130128
## Configuration scenarios
131129

132130
Configuring a BIG-IP for SHA is achieved using any of the many available methods, including several template based options, or a manual configuration.
133-
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD SHA, using these methods.
131+
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD secure hybrid access.
134132

135133
**Advanced configuration**
136134

@@ -154,7 +152,7 @@ Refer to the following advanced configuration tutorials for your integration req
154152

155153
The Guided Configuration wizard, available from BIG-IP version 13.1 aims to minimize time and effort implementing common BIG-IP publishing scenarios. Its workflow-based framework provides an intuitive deployment experience tailored to specific access topologies.
156154

157-
The latest version of the Guided Configuration 16.1 now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
155+
Version 16.x of the Guided Configuration now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
158156

159157
Refer to the following guided configuration tutorials using Easy Button templates for your integration requirements:
160158

@@ -178,16 +176,16 @@ Refer to the following guided configuration tutorials using Easy Button template
178176

179177
## Next steps
180178

181-
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by deploying a trial instance. [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
179+
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
182180

183-
- A fully secured platform to model an SHA proof of concept
181+
- A fully secured platform to model a SHA proof of concept
184182

185-
- A pre-production instance, fully secured platform to use for testing new BIG-IP system updates and hotfixes
183+
- A pre-production instance for testing new BIG-IP system updates and hotfixes
186184

187-
At the same time, you should identify one or two applications that can be targeted for publishing via the BIG-IP and protecting with SHA.
185+
At the same time, you should identify one or two applications that can be published via the BIG-IP and protected with SHA.
188186

189187
Our recommendation is to start with an application that isn’t yet published via a BIG-IP, so as to avoid potential disruption to production services. The guidelines mentioned in this article will help you get acquainted with the general procedure for creating the various BIG-IP configuration objects and setting up SHA. Once complete you should be able to do the same with any other new services, plus also have enough knowledge to convert existing BIG-IP published services over to SHA with minimal effort.
190188

191-
The below interactive guide walks through the high-level procedure for implementing SHA and seeing the end-user experience.
189+
The below interactive guide walks through the high-level procedure for implementing SHA using a non Easy Button template, and seeing the end-user experience.
192190

193191
[![The image shows interactive guide cover](media/f5-aad-integration/interactive-guide.png)](https://aka.ms/Secure-Hybrid-Access-F5-Interactive-Guide)

0 commit comments

Comments
 (0)