You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md
+22-19Lines changed: 22 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,11 +259,10 @@ To select a policy to be applied to the application being published:
259
259
260
260
A virtual server is a BIG-IP data plane object, represented by a virtual IP address, that listens for clients requests to the application. Received traffic is processed and evaluated against the APM profile associated with the virtual server. Traffic is directed according to policy.
261
261
262
-
1. For **Destination Address**, enter an IPv4 or IPv6 address BIG-IP uses to receive client traffic. Ensure a corresponding record in DNS, which enables clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
263
-
264
-
2. Enter **Service Port** as *443* for HTTPS
265
-
266
-
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
262
+
1. For **Destination Address**, enter an IPv4 or IPv6 address BIG-IP uses to receive client traffic. Ensure a corresponding record in DNS that enables clients to resolve the external URL, of the BIG-IP published application, to this IP. You can use computer's localhost DNS for testing.
263
+
2. For **Service Port**, enter **443**, and select **HTTPS**.
264
+
3. Check the box for **Enable Redirect Port**.
265
+
4. Enter a value for **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
267
266
268
267
4. The Client SSL Profile enables the virtual server for HTTPS, so that client connections are encrypted over TLS. Select the **Client SSL Profile** you created as part of the prerequisites or leave the default whilst testing
269
268
@@ -281,30 +280,34 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
281
280
282
281

283
282
284
-
Our backend application sits on HTTP port 80 but obviously switch to 443 if yours is HTTPS.
283
+
> [!NOTE]
284
+
> The Microsoft back-end application is on HTTP Port 80. If you select HTTPS, use **443**.
285
285
286
286
#### Single Sign-On & HTTP Headers
287
287
288
-
Enabling SSO allows users to access BIG-IP published services without having to enter credentials. The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO, the latter of which we’ll enable to configure the following.
288
+
With SSO, users access BIG-IP published services without entering credentials. The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO.
289
289
290
-
***Header Operation:** Insert
291
-
***Header Name:** upn
292
-
***Header Value:** %{session.saml.last.identity}
290
+
1. On Single Sign-On & HTTP Headers, in SSO Headers, for **Header Operation**, select **insert**
291
+
2. For **Header Name**, use **upn**.
292
+
3. For **Header Value**, use **%{session.saml.last.identity}**.
293
+
4. For **Header Operation**, select **insert**.
294
+
5. For **Header Name**, use **employeeid**.
295
+
6. For **Header Value**,use **%{session.saml.last.attr.name.employeeid}**.

297
298
298
-

299
-
300
-
>[!NOTE]
301
-
>APM session variables defined within curly brackets are CASE sensitive. For example, if you enter OrclGUID when the Azure AD attribute name is being defined as orclguid, it will cause an attribute mapping failure
299
+
>[!NOTE]
300
+
>APM session variables in curly brackets are case-sensitive. Inconsistencies cause aattribute mapping failures.
302
301
303
302
### Session Management
304
303
305
-
The BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and corresponding user info. Refer to [F5's docs](https://support.f5.com/csp/article/K18390492) for details on these settings.
304
+
Use BIG-IP session management settings to define conditions for user sessions termination or continuation.
305
+
306
+
To learn more, go to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
307
+
308
+
Single log-out (SLO) ensures IdP, BIG-IP, and user agent sessions terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the sign out URL, with the APM SLO endpoint. IdP-initiated sign out from My Apps terminate BIG-IP and client sessions.
306
309
307
-
What isn’t covered here however is Single Log-Out (SLO) functionality, which ensures all sessions between the IdP, the BIG-IP, and the user agent are terminated as users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it also populates the Logout Url with the APM’s SLO endpoint. That way IdP initiated sign-outs from the Azure AD MyApps portal also terminate the session between the BIG-IP and a client.
310
+
Learn more: see, [My Apps](https://myapplications.microsoft.com/)
308
311
309
312
Along with this the SAML federation metadata for the published application is also imported from your tenant, providing the APM with the SAML logout endpoint for Azure AD. This ensures SP initiated sign outs terminate the session between a client and Azure AD. But for this to be truly effective, the APM needs to know exactly when a user signs-out of the application.
0 commit comments