Skip to content

Commit f1cbcd8

Browse files
authored
Merge pull request #188268 from v-rajagt/v-nisba
Link fixed.
2 parents 9bb2eee + 4ae1cc4 commit f1cbcd8

9 files changed

+21
-23
lines changed

articles/active-directory/manage-apps/f5-aad-password-less-vpn.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,13 +21,13 @@ In this tutorial, learn how to integrate F5’s BIG-IP based Secure socket layer
2121

2222
Enabling a BIG-IP SSL-VPN for Azure AD single sign-on (SSO) provides many benefits, including:
2323

24-
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
24+
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2525
- [Password-less authentication to the VPN service](https://www.microsoft.com/security/business/identity/passwordless)
2626
- Manage Identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
2727

2828
To learn about all of the benefits, see [Integrate F5 BIG-IP with Azure Active Directory](./f5-aad-integration.md) and [What is single sign-on in Azure Active Directory?](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

30-
Despite these great value adds, classic VPNs do however remain network orientated, often providing little to zero fine grained access to corporate applications. For this reason, we encourage moving to a more Identity centric approach at achieving Zero Trust [access on a per application basis](/fundamentals/five-steps-to-full-application-integration-with-azure-ad).
30+
Despite these great value adds, classic VPNs do however remain network orientated, often providing little to zero fine grained access to corporate applications. For this reason, we encourage moving to a more Identity centric approach at achieving Zero Trust [access on a per application basis](/azure/active-directory/fundamentals/five-steps-to-full-application-integration-with-azure-ad).
3131

3232
## Scenario description
3333

@@ -61,7 +61,7 @@ Familiarizing yourself with [F5 BIG-IP terminology](https://www.f5.com/services/
6161
6262
## Add F5 BIG-IP from the Azure AD gallery
6363

64-
Setting up a SAML federation trust between the BIG-IP allows the Azure AD BIG-IP to hand off the pre-authentication and [Conditional Access](../conditional-access/overview.md) to Azure AD, before granting access to the published VPN service.
64+
Setting up a SAML federation trust between the BIG-IP allows the Azure AD BIG-IP to hand off the pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview) to Azure AD, before granting access to the published VPN service.
6565

6666
1. Sign in to the Azure AD portal using an account with application admin rights
6767

@@ -307,6 +307,6 @@ The F5 VPN application should also be visible as a target resource in Azure AD C
307307

308308
- [The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
309309

310-
- [Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)
310+
- [Five steps to full application integration with Azure AD](/azure/active-directory/fundamentals/five-steps-to-full-application-integration-with-azure-ad)
311311

312312
- [Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ In this article, you'll learn how to configure F5's BIG-IP Access Policy Manager
1717

1818
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
1919

20-
- Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
20+
- Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2121
- Full single sign-on (SSO) between Azure AD and BIG-IP published services
2222
- Identities and access are managed from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
2323

@@ -437,8 +437,6 @@ For more information, see the F5 BIG-IP [Session Variables reference](https://te
437437

438438
* [Forget passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
439439

440-
* [What is Conditional Access?](../conditional-access/overview.md)
440+
* [What is Conditional Access?](/azure/active-directory/conditional-access/overview)
441441

442442
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
443-
444-

articles/active-directory/manage-apps/f5-big-ip-header-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this article, you’ll learn to implement Secure Hybrid Access (SHA) with sin
1919

2020
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
2121

22-
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
- Full Single sign-on (SSO) between Azure AD and BIG-IP published
2525
services.
@@ -101,7 +101,7 @@ There are many methods to configure BIG-IP for this scenario, including two temp
101101
## Adding F5 BIG-IP from the Azure AD gallery
102102

103103
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing SHA. It establishes the integration required for BIG-IP to hand off pre-authentication and [conditional
104-
access](../conditional-access/overview.md) to Azure AD, before granting access to the published service.
104+
access](/azure/active-directory/conditional-access/overview) to Azure AD, before granting access to the published service.
105105

106106
1. Sign-in to the Azure AD portal using an account with application administrative rights.
107107

@@ -428,7 +428,7 @@ For more information refer to these articles:
428428

429429
- [The end of passwords, go password-less](https://www.microsoft.com/security/business/identity/passwordless)
430430

431-
- [What is Conditional Access?](../conditional-access/overview.md)
431+
- [What is Conditional Access?](/azure/active-directory/conditional-access/overview)
432432

433433
- [Microsoft Zero Trust framework to enable remote
434434
work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this article, learn to secure headers based applications with Azure Active Di
1919

2020
Integrating a BIG-IP with Azure AD provides many benefits, including:
2121

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

@@ -99,7 +99,7 @@ With the **Easy Button**, admins no longer go back and forth between Azure AD an
9999
100100
## Register Easy Button
101101

102-
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/develop/quickstart-register-app)
102+
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/azure/active-directory/develop/quickstart-register-app)
103103

104104
The Easy Button client must also be registered in Azure AD, before it is allowed to establish a trust between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
105105

articles/active-directory/manage-apps/f5-big-ip-kerberos-advanced.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn to implement Secure Hybrid Access (SHA) with sing
1919

2020
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
2121

22-
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services.
2525

@@ -503,6 +503,6 @@ For help with diagnosing KCD-related problems, see the F5 BIG-IP deployment guid
503503

504504
* [Forget passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
505505

506-
* [What is Conditional Access?](../conditional-access/overview.md)
506+
* [What is Conditional Access?](/azure/active-directory/conditional-access/overview)
507507

508508
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this article, learn to secure Kerberos-based applications with Azure Active D
1919

2020
Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
2121

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

@@ -101,7 +101,7 @@ The advanced approach provides a more flexible way of implementing SHA by manual
101101
102102
## Register Easy Button
103103

104-
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/develop/quickstart-register-app)
104+
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/azure/active-directory/develop/quickstart-register-app)
105105

106106
The Easy Button client must also be registered in Azure AD, before it is allowed to establish a trust between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
107107

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this article, learn to secure header & LDAP based applications using Azure Ac
1919

2020
Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
2121

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

@@ -108,7 +108,7 @@ For scenarios where the Guided Configuration lacks the flexibility to achieve a
108108
109109
## Register Easy Button
110110

111-
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/develop/quickstart-register-app)
111+
Before a client or service can access Microsoft Graph, it must be [trusted by the Microsoft identity platform.](/azure/active-directory/develop/quickstart-register-app)
112112

113113
The Easy Button client must also be registered in Azure AD, before it is allowed to establish a trust between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
114114

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ In this article, learn to secure Oracle Enterprise Business Suite (EBS) using Az
1919

2020
Integrating a BIG-IP with Azure AD provides many benefits, including:
2121

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

2626
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
2727

28-
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](http://f5-aad-integration.md/) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
28+
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](/azure/active-directory/manage-apps/f5-aad-integration) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

3030
## Scenario description
3131

articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ In this article, learn to secure Oracle JD Edwards using Azure Active Directory
1919

2020
Integrating a BIG-IP with Azure AD provides many benefits, including:
2121

22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
22+
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](/azure/active-directory/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

2626
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
2727

28-
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](http://f5-aad-integration.md/) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
28+
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](/azure/active-directory/manage-apps/f5-aad-integration) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

3030
## Scenario description
3131

0 commit comments

Comments
 (0)