You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Learn more:
29
29
30
30
## Scenario description
31
31
32
-
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuraion gates inbound access to the application.
32
+
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuration gates inbound access to the application.
33
33
34
34
With a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
35
35
@@ -82,7 +82,7 @@ You need the following components:
82
82
83
83
## BIG-IP configuration
84
84
85
-
The configuration in this article is a flexible SHA implemention: manual creation of BIG-IP configuration objects. Use this approach for scenarios the Guided Configuration templates don't cover.
85
+
The configuration in this article is a flexible SHA implementation: manual creation of BIG-IP configuration objects. Use this approach for scenarios the Guided Configuration templates don't cover.
86
86
87
87
>[!NOTE]
88
88
>Replace example strings or values with those from your environment.
@@ -153,7 +153,7 @@ Use the following instructions to configure BIG-IP.
153
153
154
154
### Configure SAML service provider settings
155
155
156
-
SAML SP settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
156
+
SAML SP settings define the SAML SP properties that the APM uses to overlay the legacy application with SAML preauthentication. To configure them:
157
157
158
158
1. Select **Access** > **Federation** > **SAML Service Provider**.
159
159
2. Select **Local SP Services**.
@@ -204,32 +204,32 @@ To configure the connector:
204
204
205
205
Create an APM SSO object for FBA SSO to back-end applications.
206
206
207
-
Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods emulate a user signon by injecting credentials into the username and password tags. The form is then auto-submitted. Users provide password to access an FBA application. The password is cached and reused for other FBA applications.
207
+
Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods emulate a user sign-on by injecting credentials into the username and password tags. The form is then autosubmitted. Users provide password to access an FBA application. The password is cached and reused for other FBA applications.
208
208
209
209
1. Select **Access** > **Single Sign-on**.
210
210
2. Select **Forms Based**.
211
211
3. Select **Create**.
212
212
4. For **Name**, enter a descriptive name. For example, Contoso\FBA\sso.
213
213
5. For **Use SSO Template**, select **None**.
214
-
6. For **Username Source**, enter the username source to pre-fill the password collection form. The default `session.sso.token.last.username` works well, because it has the signed-in user Azure AD UPN.
214
+
6. For **Username Source**, enter the username source to prefill the password collection form. The default `session.sso.token.last.username` works well, because it has the signed-in user Azure AD UPN.
215
215
7. For **Password Source**, keep the default `session.sso.token.last.password`, the APM variable BIG-IP uses to cache user passwords.
216
216
217
217

218
218
219
219
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO.
220
220
9. For **Form Action**, leave it blank. Then, the original request URL is used for SSO.
221
-
10. For **Form Parameter for Username**, enter the logon form username field element. Use the browser dev tools to determine the element.
222
-
11. For **Form Parameter for Password**, enter the logon form password field element. Use the browser dev tools to determine the element.
221
+
10. For **Form Parameter for Username**, enter the sign in form username field element. Use the browser dev tools to determine the element.
222
+
11. For **Form Parameter for Password**, enter the sign in form password field element. Use the browser dev tools to determine the element.
223
223
224
224

225
225
226
226

227
227
228
-
To learn more, go to techdocs.f5.com for [Manual Chapter: Single Sign-On Methods](https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-single-sign-on-concepts-configuration-14-1-0/single-sign-on-methods.html#GUID-F8588DF4-F395-4E44-881B-8D16EED91449)
228
+
To learn more, go to techdocs.f5.com for [Manual Chapter: Single sign-on methods](https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-single-sign-on-concepts-configuration-14-1-0/single-sign-on-methods.html#GUID-F8588DF4-F395-4E44-881B-8D16EED91449)
229
229
230
230
### Configure an Access profile
231
231
232
-
An access profile binds APM elements that manage access to BIG-IP virtual servers, including access policies, SSO configuration, and UI settings.
232
+
An access profile binds the APM elements that manage access to BIG-IP virtual servers, including access policies, SSO configuration, and UI settings.
@@ -272,7 +272,7 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
272
272
273
273

274
274
275
-
21. For the logon page fallback, select the **+** sign. This action adds an SSO credential mapping object.
275
+
21. For the sign in page fallback, select the **+** sign. This action adds an SSO credential mapping object.
276
276
277
277
22. In the pop-up, select the **Assignment** tab.
278
278
23. Select **SSO Credential Mapping**.
@@ -377,13 +377,13 @@ BIG-IP session management settings define conditions for sessions termination an
377
377
3. Select **Access Profile**.
378
378
4. From the list, select your application.
379
379
380
-
If you defined a single logout URI value in Azure AD, IdP-initiated sign-out from MyApps ends the client and the BIG-IP APM session. The imported application federation metadata XML file provides the APM with the Azure AD SAML endpoint for SP-initiated sign-outs. Ensure the APM responds correctly to a user sign out.
380
+
If you defined a single logout URI value in Azure AD, IdP-initiated signout from MyApps ends the client and the BIG-IP APM session. The imported application federation metadata XML file provides the APM with the Azure AD SAML endpoint for SP-initiated sign out. Ensure the APM responds correctly to a user sign out.
381
381
382
-
If there's no BIG-IP web portal, users can't instruct the APM to sign out. If the user signs out of the application, BIG-IP is oblivious. The application session can be reinstated through SSO. For SP-initiated sign-out, ensure sessions terminate securely.
382
+
If there's no BIG-IP web portal, users can't instruct the APM to sign out. If the user signs out of the application, BIG-IP is oblivious. The application session can be reinstated through SSO. For SP-initiated signout, ensure sessions terminate securely.
383
383
384
-
You can add an SLO function to your application **sign out** button. This function redirects the client to the Azure AD SAML sign out endpoint. To locate SAML sign-out endpoint, go to **App Registrations > Endpoints**.
384
+
You can add an SLO function to your application **sign out** button. This function redirects the client to the Azure AD SAML sign out endpoint. To locate SAML signout endpoint, go to **App Registrations > Endpoints**.
385
385
386
-
If you can't change the app, have the BIG-IP listen for the app sign-out call and trigger SLO.
386
+
If you can't change the app, have the BIG-IP listen for the app signout call and trigger SLO.
387
387
388
388
Learn more:
389
389
@@ -409,7 +409,7 @@ For increased security, block direct access to the application, enforcing a path
409
409

410
410
411
411
6. The information is submitted.
412
-
7. You are signed in to the application.
412
+
7. You're signed in to the application.
413
413
414
414

415
415
@@ -425,7 +425,7 @@ When troubleshooting, consider the following information
425
425
* You can specify form name and customize the JavaScript form handler logic
426
426
* Both FBA SSO methods optimize user experience and security by hiding form interactions:
427
427
* You can validate if the credentials are injected
428
-
* In client-initiated mode, disable form auto-submission in your SSO profile
428
+
* In client-initiated mode, disable form autosubmission in your SSO profile
429
429
* Use dev tools to disable the two style properties that prevent the sign in page from appearing
430
430
431
431

0 commit comments