Skip to content

Commit f472a9b

Browse files
authored
Consistency updates
1 parent 4b82ab9 commit f472a9b

File tree

1 file changed

+3
-7
lines changed

1 file changed

+3
-7
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,11 @@ To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD i
2929

3030
## Scenario description
3131

32-
This scenario looks at the classic legacy application using HTTP authorization headers to control access to protected content.
32+
This scenario looks at the classic legacy application using **HTTP authorization headers** sourced from LDAP diretcory attributes, to manage access to protected content.
3333

34-
Being legacy, the application lacks any form of modern protocols to support a direct integration with Azure AD. Modernizing the app is also costly, requires careful planning, and introduces risk of potential downtime.
34+
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
3535

36-
One option would be to consider [Azure AD Application Proxy](../app-proxy/application-proxy.md), to gate remote access to the application.
37-
38-
Another approach is to use an F5 BIG-IP Application Delivery Controller (ADC), as it too provides the protocol transitioning required to bridge legacy applications to the modern ID control plane.
39-
40-
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application for both remote and local access.
36+
Having a BIG-IP in front of the app enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application.
4137

4238
## Scenario architecture
4339

0 commit comments

Comments
 (0)