You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+20-17Lines changed: 20 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,42 +115,45 @@ Configure the BIG-IP registration to fulfill SAML tokens that BIG-IP APM request
115
115
4. Select **No, I'll save later**.
116
116
5. On the **Set up single sign-on with SAML** pane, select the **pen** icon.
117
117
6. For **Identifier**, replace the value with the BIG-IP published application URL.
118
-
7. For **Reply URL**, replace the value, but retain the path for the application SAML SP endpoint. The SAML flow operates in IdP-initiated mode. Azure AD issues a SAML assertion, then the user is redirected to the BIG-IP endpoint.
118
+
7. For **Reply URL**, replace the value, but retain the path for the application SAML SP endpoint. With this configuration, SAML flow operates in IdP-initiated mode. Azure AD issues a SAML assertion, then the user is redirected to the BIG-IP endpoint.
119
119
9. For SP-initiated mode, for **Sign on URL**, enter the application URL.
120
-
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. BIG-IP APM user sessions end when they sign out of Azure AD.
120
+
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. Then, BIG-IP APM user sessions end when they sign out of Azure AD.
121
121
122
-

122
+

123
123
124
124
> [!NOTE]
125
-
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is /saml/sp/profile/redirect/slo.
125
+
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is `/saml/sp/profile/redirect/slo`.
126
126
127
-
4. Select **Save** before closing the SAML configuration pane and skip the SSO test prompt.
127
+
11. Select **Save**.
128
+
12. Close the SAML configuration pane.
129
+
13. Skip the SSO test prompt.
130
+
14. Make a note of the **User Attributes & Claims** section properties. Azure AD issues the properties for BIG-IP APM authentication, and SSO to the back-end application.
131
+
15. On the **SAML Signing Certificate** pane, select **Download**.
132
+
16. The **Federation Metadata XML** file is saved to your computer.
128
133
129
-
5. Note the properties of the **User Attributes & Claims** section. Azure AD will issue these properties to users for BIG-IP APM authentication and for SSO to the back-end application.
134
+

130
135
131
-
6. On the **SAML Signing Certificate** pane, select **Download** to save the **Federation Metadata XML** file to your computer.
136
+
> [!NOTE]
137
+
> Azure AD SAML signing certificates have a lifespan of three years.
132
138
133
-

134
-
135
-
SAML signing certificates created by Azure AD have a lifespan of three years. For more information, see [Managed certificates for federated single sign-on](./manage-certificates-for-federated-single-sign-on.md).
139
+
Learn more: [Tutorial: Manage certificates for federated single sign-on](tutorial-manage-certificates-for-federated-single-sign-on.md)
136
140
137
141
### Assign users and groups
138
142
139
-
By default, Azure AD will issue tokens only for users who have been granted access to an application. To grant specific users and groups access to the application:
143
+
Azure AD issues tokens for users granted access to an application. To grant specific users and groups application access:
140
144
141
145
1. On the **F5 BIG-IP application's overview** pane, select **Assign Users and groups**.
142
-
143
146
2. Select **+ Add user/group**.
147
+
3. Select the users and groups you want.
148
+
4. Select **Assign**.
144
149
145
-
3. Select users and groups, and then select **Assign** to assign them to your application.
146
-
147
-
## BIG-IP Advanced configuration
150
+
## BIG-IP advanced configuration
148
151
149
-
Now you can proceed with setting up the BIG-IP configurations.
152
+
Use the following instructions to configure BIG-IP.
150
153
151
154
### Configure SAML service provider settings
152
155
153
-
SAML service provider settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
156
+
SAML SP settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
154
157
155
158
1. Select **Access** > **Federation** > **SAML Service Provider** > **Local SP Services**, and then select **Create**.
0 commit comments