Skip to content

Commit e588d7a

Browse files
authored
Merge pull request #189868 from Rainier-MSFT/patch-123
Consistency updates
2 parents 9adb07f + 980e6b6 commit e588d7a

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@ The **Application Pool tab** details the services behind a BIG-IP that are repre
309309

310310
2. Choose the **Load Balancing Method** as *Round Robin*
311311

312-
3. Update **Pool Servers**. Select an existing node or specify an IP and port for the server hosting the header-based application
312+
3. For **Pool Servers** select an existing node or specify an IP and port for the server hosting the header-based application
313313

314314
![Screenshot for Application pool](./media/f5-big-ip-oracle/application-pool.png)
315315

@@ -384,28 +384,29 @@ At that point, changes via the wizard UI are no longer possible, but all BIG-IP
384384

385385
## Troubleshooting
386386

387-
You can fail to access the secure hybrid access protected application due to any number of factors, including a misconfiguration.
388-
389-
BIG-IP logs are a great source of information for isolating all sorts of authentication & SSO issues. When troubleshooting you should increase the log verbosity level.
387+
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
390388

391389
1. Navigate to **Access Policy > Overview > Event Logs > Settings**
392390

393391
2. Select the row for your published application then **Edit > Access System Logs**
394392

395393
3. Select **Debug** from the SSO list then **OK**
396394

397-
Reproduce your issue before looking at the logs but remember to switch this back when finished. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
395+
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
396+
397+
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
398398

399399
1. Navigate to **Access > Overview > Access reports**
400-
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
400+
401+
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
401402

402403
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
403404

404-
1. In which case you should head to **Access Policy > Overview > Active Sessions** and select the link for your active session
405+
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
405406

406-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes
407+
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
407408

408-
3. The following command from a bash shell validates the APM service account used for LDAP queries and can successfully authenticate and query a user object:
409+
The following command can also be used from the BIG-IP bash shell to validate the APM service account used for LDAP queries and can successfully authenticate and query a user object:
409410

410411
```ldapsearch -xLLL -H 'ldap://192.168.0.58' -b "CN=partners,dc=contoso,dc=lds" -s sub -D "CN=f5-apm,CN=partners,DC=contoso,DC=lds" -w 'P@55w0rd!' "(cn=testuser)" ```
411412

0 commit comments

Comments
 (0)