Integrate F5 BIG-IP with Azure Active Directory
With increases in the threat landscape and the use of multiple mobile devices, organizations are rethinking resource access and governance. Part of modernization programs include assessing your readiness across identities, devices, apps, infrastructure, network, and data. You can learn about the Zero Trust framework to enable remote work and the Zero Trust Assessment tool.
At Microsoft and F5, we realize your digital transformation is a long-term journey, potentially critical resources are exposed until modernized. The goal of F5 BIG-IP and Azure Active Directory (Azure AD) secure hybrid access (SHA) is to improve remote access to on-premises applications, and strengthen the security posture of vulnerable legacy services.
Research estimates that 60%-80% of on-premises applications are legacy, or incapable of being integrated with Azure AD. The same study indicates a large proportion of similar systems run on previous versions of SAP, Oracle, SAGE, and other well-known workloads for critical services.
SHA enables organizations to continue using investments in F5 network and application delivery. With Azure AD, SHA bridges the gap with the identity control plane.
When Azure AD pre-authenticates access to BIG-IP published services, there are many benefits:
- Password-less authentication with:
Other benefits include:
- One control plane to govern identity and access
- The Azure AD portal
- Preemptive Conditional Access
- Azure AD Multi-Factor Authentication (MFA)
- Adaptive protection through user and session risk profiling
- Leaked credential detection
- Self-service password reset (SSPR)
- Entitlement management for governed guest access
- App discovery and control
- Threat monitoring and analytics with Microsoft Sentinel
As an Application Delivery Controller (ADC) and secure socket layer virtual private network (SSL-VPN), a BIG-IP system provides local and remote access to services, including:
- Modern and legacy web applications
- Non-web-based applications
- Representational State Transfer (REST) and Simple Object Access Protocol (SOAP) Web application programming interface (API) services
BIG-IP Local Traffic Manager (LTM) is for secure service publishing, while an Access Policy Manager (APM) extends BIG-IP functions that enable identity federation and single sign-on (SSO).
With integration, you achieve the protocol transition to secure legacy, or non-Azure AD-integrated services, with controls such as:
In the scenario, a BIG-IP is a reverse proxy that hands off service pre-authentication and authorization to Azure AD. The integration is based on a standard federation trust between the APM and Azure AD. This scenario is common with SHA. Learn more: Configure F5 BIG-IP SSL-VPN for Azure AD SSO. With SHA you can secure Security Assertion Markup Language (SAML), Open Authorization (OAuth), and Open ID Connect (OIDC) resources.
When used for local and remote access, a BIG-IP can be a choke point for Zero Trust access to services, including software as a service (SaaS) apps.
The following diagram illustrates the front-end pre-authentication exchange between a user, a BIG-IP, and Azure AD, in a service provider (SP) initiated flow. It then shows subsequent APM session enrichment, and SSO to individual back-end services.
- In the portal, a user selects an application icon, resolving URL to the SAML SP (BIG-IP)
- BIG-IP redirects the user to the SAML identity provider (IdP), Azure AD, for pre-authentication
- Azure AD processes Conditional Access policies and session controls for authorization
- User goes back to BIG-IP, and presents the SAML claims issued by Azure AD
- BIG-IP requests session information for SSO and role-based access control (RBAC) to the published service
- BIG-IP forwards the client request to the back-end service
Whether an employee, affiliate, or consumer, most users are acquainted with the Office 365 sign-in experience. Accessing BIG-IP services is similar.
Users can find their BIG-IP published services in the My Apps portal or Microsoft 365 app launcher with self-service capabilities, regardless of device or location. Users can continue accessing published services with the BIG-IP Webtop portal. When users sign out, SHA ensures session termination for BIG-IP and Azure AD, helping services remain protected from unauthorized access.
Users access the My Apps portal to find BIG-IP published services and to manage their account properties. See the gallery and self-service page in the following graphics.
Insights and analytics
You can monitor deployed BIG-IP instances to ensure published services are highly available, at an SHA level and operationally.
There are several options to log events locally, or remotely through a Security Information and Event Management (SIEM) solution, which enables storage and telemetry processing. To monitor Azure AD and SHA activity, you can use Azure Monitor and Microsoft Sentinel, together:
Overview of your organization, potentially across multiple clouds, and on-premises locations, including BIG-IP infrastructure
One control plane with view of signals, avoiding reliance on complex, and disparate tools
No previous experience, or F5 BIG-IP knowledge, is necessary to implement SHA, but we recommend you learn some F5 BIG-IP terminology. See the F5 service Glossary.
Integrating an F5 BIG-IP with Azure AD for SHA has the following prerequisites:
- An F5 BIG-IP instance running on:
- Physical appliance
- Hypervisor Virtual Edition such as Microsoft Hyper-V, VMware ESXi, Linux KVM, and Citrix Hypervisor
- Cloud Virtual Edition such as Azure, VMware, KVM, Community Xen, MS Hyper-V, AWS, OpenStack, and Google Cloud
The BIG-IP instance location can be on-premises or a supported cloud platform including Azure. The instance has internet connectivity, resources being published, and any services such as Active Directory.
- An active F5 BIG-IP APM license:
- F5 BIG-IP® Best bundle
- F5 BIG-IP Access Policy Manager™ standalone license
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
- A 90-day BIG-IP Access Policy Manager™ (APM) trial license
- Azure AD licensing:
You can configure a BIG-IP for SHA with template-based options, or a manual configuration. The following tutorials have guidance on implementing BIG-IP and Azure AD secure hybrid access.
The advanced approach is a flexible way to implement SHA. You manually create all BIG-IP configuration objects. Use this approach for scenarios not in guided configuration templates.
Advanced configuration tutorials:
Guided Configuration and Easy Button templates
The BIG-IP version 13.1 Guided Configuration wizard, minimizes time and effort to implement common BIG-IP publishing scenarios. Its workflow framework provides an intuitive deployment experience, for specific access topologies.
Guided Configuration version 16.x has the Easy Button feature: admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled by the APM Guided Configuration wizard and Microsoft Graph. This integration between BIG-IP APM and Azure AD ensures applications support identity federation, SSO, and Azure AD Conditional Access, without the management overhead of doing so for each app.
Tutorials for using Easy Button templates, F5 BIG-IP Easy Button for SSO to:
Azure AD B2B guest access
Azure AD B2B guest access to SHA-protected applications is possible, but might require steps not in the tutorials. One example is Kerberos SSO, when a BIG-IP performs kerberos constrained delegation (KCD) to obtain a service ticket from domain controllers. Without a local representation of a local guest user, a domain controller won't honor the request because there's no user. To support this scenario, ensure external identities are flowed down from your Azure AD tenant to the directory used by the application.
You can conduct a proof-of-concept for SHA using your BIG-IP infrastructure, or by Deploying a BIG-IP Virtual Edition (VE) VM into Azure. To deploy a VM in Azure takes approximately 30 minutes, then you'll have:
- A secured platform to model a pilot for SHA
- A pre-production instance for testing new BIG-IP system updates and hotfixes
Identify one or two applications to be published with BIG-IP and protected with SHA.
Our recommendation is to start with an application that isn’t published via a BIG-IP. This action avoids potential disruption to production services. The guidelines in this article can help you learn about the procedure to create BIG-IP configuration objects and setting up SHA. You can then convert BIG-IP published services to SHA with minimal effort.
The following interactive guide illustrates implementing SHA with a template, and the end-user experience.