Skip to content

Commit fa8b5f4

Browse files
authored
Update f5-big-ip-forms-advanced.md
1 parent c3e1de0 commit fa8b5f4

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Learn more:
2929

3030
## Scenario description
3131

32-
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuraion gates inbound access to the application.
32+
For the scenario, there's an internal legacy application configured for form-based authentication (FBA). Ideally, Azure AD manages application access, because legacy lacks modern authentication protocols. Modernization takes time and effort, introducing the risk of downtime. Instead, deploy a BIG-IP between the public internet and the internal application. This configuration gates inbound access to the application.
3333

3434
With a BIG-IP in front of the application, you can overlay the service with Azure AD preauthentication and header-based SSO. The overlay improves application security posture.
3535

@@ -82,7 +82,7 @@ You need the following components:
8282

8383
## BIG-IP configuration
8484

85-
The configuration in this article is a flexible SHA implemention: manual creation of BIG-IP configuration objects. Use this approach for scenarios the Guided Configuration templates don't cover.
85+
The configuration in this article is a flexible SHA implementation: manual creation of BIG-IP configuration objects. Use this approach for scenarios the Guided Configuration templates don't cover.
8686

8787
>[!NOTE]
8888
>Replace example strings or values with those from your environment.
@@ -153,7 +153,7 @@ Use the following instructions to configure BIG-IP.
153153

154154
### Configure SAML service provider settings
155155

156-
SAML SP settings define the SAML SP properties that the APM will use for overlaying the legacy application with SAML pre-authentication. To configure them:
156+
SAML SP settings define the SAML SP properties that the APM uses to overlay the legacy application with SAML preauthentication. To configure them:
157157

158158
1. Select **Access** > **Federation** > **SAML Service Provider**.
159159
2. Select **Local SP Services**.
@@ -204,32 +204,32 @@ To configure the connector:
204204

205205
Create an APM SSO object for FBA SSO to back-end applications.
206206

207-
Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods emulate a user sign on by injecting credentials into the username and password tags. The form is then auto-submitted. Users provide password to access an FBA application. The password is cached and reused for other FBA applications.
207+
Perform FBA SSO in client-initiated mode or BIG-IP-initiated mode. Both methods emulate a user sign-on by injecting credentials into the username and password tags. The form is then autosubmitted. Users provide password to access an FBA application. The password is cached and reused for other FBA applications.
208208

209209
1. Select **Access** > **Single Sign-on**.
210210
2. Select **Forms Based**.
211211
3. Select **Create**.
212212
4. For **Name**, enter a descriptive name. For example, Contoso\FBA\sso.
213213
5. For **Use SSO Template**, select **None**.
214-
6. For **Username Source**, enter the username source to pre-fill the password collection form. The default `session.sso.token.last.username` works well, because it has the signed-in user Azure AD UPN.
214+
6. For **Username Source**, enter the username source to prefill the password collection form. The default `session.sso.token.last.username` works well, because it has the signed-in user Azure AD UPN.
215215
7. For **Password Source**, keep the default `session.sso.token.last.password`, the APM variable BIG-IP uses to cache user passwords.
216216

217217
![Screenshot of Name and Use SSO Template options under New SSO Configuration.](./media/f5-big-ip-forms-advanced/new-sso-configuration.png)
218218

219219
8. For **Start URI**, enter the FBA application logon URI. If the request URI matches this URI value, the APM form-based authentication executes SSO.
220220
9. For **Form Action**, leave it blank. Then, the original request URL is used for SSO.
221-
10. For **Form Parameter for Username**, enter the logon form username field element. Use the browser dev tools to determine the element.
222-
11. For **Form Parameter for Password**, enter the logon form password field element. Use the browser dev tools to determine the element.
221+
10. For **Form Parameter for Username**, enter the sign in form username field element. Use the browser dev tools to determine the element.
222+
11. For **Form Parameter for Password**, enter the sign in form password field element. Use the browser dev tools to determine the element.
223223

224224
![Screenshot of Start URI, Form Parameter For User Name, and Form Parameter For Password fields.](./media/f5-big-ip-forms-advanced/sso-method-configuration.png)
225225

226226
![Screenshot of the sign in page with callouts for username field and password field.](./media/f5-big-ip-forms-advanced/contoso-example.png)
227227

228-
To learn more, go to techdocs.f5.com for [Manual Chapter: Single Sign-On Methods](https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-single-sign-on-concepts-configuration-14-1-0/single-sign-on-methods.html#GUID-F8588DF4-F395-4E44-881B-8D16EED91449)
228+
To learn more, go to techdocs.f5.com for [Manual Chapter: Single sign-on methods](https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-single-sign-on-concepts-configuration-14-1-0/single-sign-on-methods.html#GUID-F8588DF4-F395-4E44-881B-8D16EED91449)
229229

230230
### Configure an Access profile
231231

232-
An access profile binds APM elements that manage access to BIG-IP virtual servers, including access policies, SSO configuration, and UI settings.
232+
An access profile binds the APM elements that manage access to BIG-IP virtual servers, including access policies, SSO configuration, and UI settings.
233233

234234
1. Select **Access** > **Profiles / Policies**.
235235
2. Select **Access Profiles (Per-Session Policies)**.
@@ -272,7 +272,7 @@ An access profile binds APM elements that manage access to BIG-IP virtual server
272272

273273
![Screenshot of the Yes option in the username row on the Properties tab.](./media/f5-big-ip-forms-advanced/set-read-only-as-yes.png)
274274

275-
21. For the logon page fallback, select the **+** sign. This action adds an SSO credential mapping object.
275+
21. For the sign in page fallback, select the **+** sign. This action adds an SSO credential mapping object.
276276

277277
22. In the pop-up, select the **Assignment** tab.
278278
23. Select **SSO Credential Mapping**.
@@ -377,13 +377,13 @@ BIG-IP session management settings define conditions for sessions termination an
377377
3. Select **Access Profile**.
378378
4. From the list, select your application.
379379

380-
If you defined a single logout URI value in Azure AD, IdP-initiated sign-out from MyApps ends the client and the BIG-IP APM session. The imported application federation metadata XML file provides the APM with the Azure AD SAML endpoint for SP-initiated sign-outs. Ensure the APM responds correctly to a user sign out.
380+
If you defined a single logout URI value in Azure AD, IdP-initiated sign out from MyApps ends the client and the BIG-IP APM session. The imported application federation metadata XML file provides the APM with the Azure AD SAML endpoint for SP-initiated sign out. Ensure the APM responds correctly to a user sign out.
381381

382-
If there's no BIG-IP web portal, users can't instruct the APM to sign out. If the user signs out of the application, BIG-IP is oblivious. The application session can be reinstated through SSO. For SP-initiated sign-out, ensure sessions terminate securely.
382+
If there's no BIG-IP web portal, users can't instruct the APM to sign out. If the user signs out of the application, BIG-IP is oblivious. The application session can be reinstated through SSO. For SP-initiated sign out, ensure sessions terminate securely.
383383

384-
You can add an SLO function to your application **sign out** button. This function redirects the client to the Azure AD SAML sign out endpoint. To locate SAML sign-out endpoint, go to **App Registrations > Endpoints**.
384+
You can add an SLO function to your application **sign out** button. This function redirects the client to the Azure AD SAML sign out endpoint. To locate SAML sign out endpoint, go to **App Registrations > Endpoints**.
385385

386-
If you can't change the app, have the BIG-IP listen for the app sign-out call and trigger SLO.
386+
If you can't change the app, have the BIG-IP listen for the app sign out call and trigger SLO.
387387

388388
Learn more:
389389

@@ -409,7 +409,7 @@ For increased security, block direct access to the application, enforcing a path
409409
![Screenshot of the sign in page.](./media/f5-big-ip-forms-advanced/secured-sso.png)
410410

411411
6. The information is submitted.
412-
7. You are signed in to the application.
412+
7. You're signed in to the application.
413413

414414
![Screenshot of Welcome page.](./media/f5-big-ip-forms-advanced/welcome-message.png)
415415

@@ -425,7 +425,7 @@ When troubleshooting, consider the following information
425425
* You can specify form name and customize the JavaScript form handler logic
426426
* Both FBA SSO methods optimize user experience and security by hiding form interactions:
427427
* You can validate if the credentials are injected
428-
* In client-initiated mode, disable form auto-submission in your SSO profile
428+
* In client-initiated mode, disable form autosubmission in your SSO profile
429429
* Use dev tools to disable the two style properties that prevent the sign in page from appearing
430430

431431
![Screenshot of the Properties page.](./media/f5-big-ip-forms-advanced/properties.png)

0 commit comments

Comments
 (0)