Forum Discussion
F5 ADFS iApp to replace the ADFS proxy (WAP)
We are having issues using the AD FS iApp for the ADFS proxy with ADFS certificate multi-factor authentication enabled. The iApp created two VIPS, one on port 443 with access policy assigned, and one layer 4 on port 49443. ADFS certificate MFA works fine if we don't specify the ADFS claims rule based on location (inside the network). The iApp created the appropriate iRules to forward the x-headers, and the x-headers are present for the VIP on port 443.
F5 Version 12.1, AD FS 3.0
When we enable the ADFS claims rule for (insidethenetwork) on the ADFS server, certificate MFA does not work, the ADFS server is resetting the connection. It seems like the ADFS server thinks that the request on port 49443 is from inside the network, which does not require MFA, based on the claims rule below.
Anyone else run into this?
- Corey_12957Historic F5 Account
Hello @WillUsable,
Native ADFS integration using the adfs-pip protocol, including certificate support is included in version TMOS v13.1.
For versions prior to 13.1 please reference the deployment guide/iApp.
https://www.f5.com/pdf/deployment-guides/microsoft-adfs-dg.pdf
Page 20 highlights what needs to be done to support certificate authentication.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com