Skip to content

Commit dc2ff3f

Browse files
authored
Update f5-big-ip-forms-advanced.md
1 parent 78e9f7f commit dc2ff3f

File tree

1 file changed

+20
-17
lines changed

1 file changed

+20
-17
lines changed

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -115,42 +115,45 @@ Configure the BIG-IP registration to fulfill SAML tokens that BIG-IP APM request
115115
4. Select **No, I'll save later**.
116116
5. On the **Set up single sign-on with SAML** pane, select the **pen** icon.
117117
6. For **Identifier**, replace the value with the BIG-IP published application URL.
118-
7. For **Reply URL**, replace the value, but retain the path for the application SAML SP endpoint. The SAML flow operates in IdP-initiated mode. Azure AD issues a SAML assertion, then the user is redirected to the BIG-IP endpoint.
118+
7. For **Reply URL**, replace the value, but retain the path for the application SAML SP endpoint. With this configuration, SAML flow operates in IdP-initiated mode. Azure AD issues a SAML assertion, then the user is redirected to the BIG-IP endpoint.
119119
9. For SP-initiated mode, for **Sign on URL**, enter the application URL.
120-
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. BIG-IP APM user sessions end when they sign out of Azure AD.
120+
10. For **Logout Url**, enter the BIG-IP APM single logout (SLO) endpoint prepended by the service host header. Then, BIG-IP APM user sessions end when they sign out of Azure AD.
121121

122-
![Screenshot showing a basic SAML configuration.](./media/f5-big-ip-forms-advanced/basic-saml-configuration.png)
122+
![Screenshot of URLs in Basic SAML Configuration.](./media/f5-big-ip-forms-advanced/basic-saml-configuration.png)
123123

124124
> [!NOTE]
125-
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is /saml/sp/profile/redirect/slo.
125+
> From Traffic Management Operating System (TMOS) v16 onward, the SAML SLO endpoint is `/saml/sp/profile/redirect/slo`.
126126
127-
4. Select **Save** before closing the SAML configuration pane and skip the SSO test prompt.
127+
11. Select **Save**.
128+
12. Close the SAML configuration pane.
129+
13. Skip the SSO test prompt.
130+
14. Make a note of the **User Attributes & Claims** section properties. Azure AD issues the properties for BIG-IP APM authentication, and SSO to the back-end application.
131+
15. On the **SAML Signing Certificate** pane, select **Download**.
132+
16. The **Federation Metadata XML** file is saved to your computer.
128133

129-
5. Note the properties of the **User Attributes & Claims** section. Azure AD will issue these properties to users for BIG-IP APM authentication and for SSO to the back-end application.
134+
![Screenshot a Download option under SAML Signing Certificate.](./media/f5-big-ip-forms-advanced/saml-certificate.png)
130135

131-
6. On the **SAML Signing Certificate** pane, select **Download** to save the **Federation Metadata XML** file to your computer.
136+
> [!NOTE]
137+
> Azure AD SAML signing certificates have a lifespan of three years.
132138
133-
![Screenshot of the 'Federation Metadata XML' download link.](./media/f5-big-ip-forms-advanced/saml-certificate.png)
134-
135-
SAML signing certificates created by Azure AD have a lifespan of three years. For more information, see [Managed certificates for federated single sign-on](./manage-certificates-for-federated-single-sign-on.md).
139+
Learn more: [Tutorial: Manage certificates for federated single sign-on](tutorial-manage-certificates-for-federated-single-sign-on.md)
136140

137141
### Assign users and groups
138142

139-
By default, Azure AD will issue tokens only for users who have been granted access to an application. To grant specific users and groups access to the application:
143+
Azure AD issues tokens for users granted access to an application. To grant specific users and groups application access:
140144

141145
1. On the **F5 BIG-IP application's overview** pane, select **Assign Users and groups**.
142-
143146
2. Select **+ Add user/group**.
147+
3. Select the users and groups you want.
148+
4. Select **Assign**.
144149

145-
3. Select users and groups, and then select **Assign** to assign them to your application.
146-
147-
## BIG-IP Advanced configuration
150+
## BIG-IP advanced configuration
148151

149-
Now you can proceed with setting up the BIG-IP configurations.
152+
Use the following instructions to configure BIG-IP.
150153

151154
### Configure SAML service provider settings
152155

153-
SAML service provider settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
156+
SAML SP settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
154157

155158
1. Select **Access** > **Federation** > **SAML Service Provider** > **Local SP Services**, and then select **Create**.
156159

0 commit comments

Comments
 (0)