Skip to content

Commit cc012f1

Browse files
authored
Update f5-aad-password-less-vpn.md
1 parent 186a300 commit cc012f1

File tree

1 file changed

+17
-15
lines changed

1 file changed

+17
-15
lines changed

articles/active-directory/manage-apps/f5-aad-password-less-vpn.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Set up a SAML federation trust between the BIG-IP to allow the Azure AD BIG-IP t
6868
1. Sign in to the Azure AD portal with application admin rights.
6969
2. From the left navigation pane, select the **Azure Active Directory service**.
7070
3. Go to **Enterprise Applications** and from the top ribbon select **New application**.
71-
4. In the gallery search for F5 and select **F5 BIG-IP APM Azure AD integration**.
71+
4. In the gallery, search for F5 and select **F5 BIG-IP APM Azure AD integration**.
7272
5. Enter a name for the application.
7373
6. Select **Add** then **Create**.
7474
7. The name, as an icon, appears in the Azure portal and Office 365 portal.
@@ -114,7 +114,7 @@ By default, Azure AD issues tokens to users with granted access to a service.
114114

115115
1. In the application configuration view, select **Users and groups**.
116116
2. Select **+ Add user**.
117-
3. In the **Add Assignment** menu select **Users and groups**.
117+
3. In the **Add Assignment** menu, select **Users and groups**.
118118
4. In the **Users and groups** dialog, add the user groups authorized to access the VPN
119119
5. Select **Select** > **Assign**.
120120

@@ -133,32 +133,32 @@ To complete federating the VPN service with Azure AD, create the BIG-IP SAML ser
133133

134134
![Image shows BIG-IP SAML configuration](media/f5-sso-vpn/bigip-saml-configuration.png)
135135

136-
2. Enter a **Name** and the **Entity ID** defined in Azure AD.
137-
3. Enter the Host FQDN to connect to the application.
136+
3. Enter a **Name** and the **Entity ID** defined in Azure AD.
137+
4. Enter the Host FQDN to connect to the application.
138138

139139
![Image shows creating new SAML SP service](media/f5-sso-vpn/create-new-saml-sp.png)
140140

141141
>[!NOTE]
142142
>If the entity ID isn't an exact match of the hostname of the published URL, configure SP **Name** settings, or perform this action if it isn’t in hostname URL format. If entity ID is `urn:ssl-vpn:contosoonline`, provide the external scheme and hostname of the application being published.
143143
144-
4. Scroll down to select the new **SAML SP object**.
145-
5. Select **Bind/UnBind IDP Connectors**.
144+
5. Scroll down to select the new **SAML SP object**.
145+
6. Select **Bind/UnBind IDP Connectors**.
146146

147147
![Image shows creating federation with local SP service](media/f5-sso-vpn/federation-local-sp-service.png)
148148

149-
6. Select **Create New IDP Connector**.
150-
7. From the drop-down menu select **From Metadata**
149+
7. Select **Create New IDP Connector**.
150+
8. From the drop-down menu, select **From Metadata**
151151

152152
![Image shows create new IDP connector](media/f5-sso-vpn/create-new-idp-connector.png)
153153

154-
8. Browse to the federation metadata XML file you downloaded.
155-
9. For the APM object,provide an **Identity Provider Name** that represents the external SAML IdP.
156-
10. To select the new Azure AD external IdP connector, select **Add New Row**.
154+
9. Browse to the federation metadata XML file you downloaded.
155+
10. For the APM object,provide an **Identity Provider Name** that represents the external SAML IdP.
156+
11. To select the new Azure AD external IdP connector, select **Add New Row**.
157157

158158
![Image shows external IDP connector](media/f5-sso-vpn/external-idp-connector.png)
159159

160-
11. Select **Update**.
161-
12. Select **OK**.
160+
12. Select **Update**.
161+
13. Select **OK**.
162162

163163
![Image shows SAML IDP using SP](media/f5-sso-vpn/saml-idp-using-sp.png)
164164

@@ -254,7 +254,7 @@ An access policy enables the service for SAML authentication.
254254

255255
![Image shows saml authentication](media/f5-sso-vpn/saml-authentication.png)
256256

257-
14. For the Successful branch of SAML aut, shelect **+** .
257+
14. For the Successful branch of SAML auth, select **+** .
258258
15. From the Assignment tab, select **Advanced Resource Assign**.
259259
16. Select **Add Item**.
260260

@@ -314,7 +314,9 @@ Your SSL-VPN service is published and accessible via SHA, either with its URL or
314314

315315
## Next steps
316316

317-
Open a browser on a remote Windows client. Browse to the **BIG-IP VPN service** URL. After authenticating to Azure AD, the BIG-IP webtop portal and VPN launcher appear.
317+
1. Open a browser on a remote Windows client.
318+
2. Browse to the **BIG-IP VPN service** URL.
319+
3. The BIG-IP webtop portal and VPN launcher appear.
318320

319321
![Image shows vpn launcher](media/f5-sso-vpn/vpn-launcher.png)
320322

0 commit comments

Comments
 (0)