Forum Discussion
iRule to block access to Office 365 components when using APM SAML 2.0 iApp
Deployed BIG-IP APM as a SAML 2.0 Identity Provider for Microsoft Office 365. One iApp facilitates internal authentication, while the other facilitates external. Interested in creating an iRule that would allow only ActiveSync requests to be authenticated, but block OWA and Outlook client requests. I see you can use claim rules when AD FS is Windows-based (https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/hh526961(v=ws.10)), but the F5 has replaced the AD FS infrastructure. Is this possible with an iRule on the external iApp?
- Ryan_W__278625
Nimbostratus
I am going to test the iRule listed below. Should this work for blocking all authentication requests except for ActiveSync for the Office 365 SAML iApp?
when HTTP_REQUEST { switch -glob -- [string tolower [HTTP::path]] { "/ews" { ACCESS::disable } "/autodiscover" { ACCESS::disable } "/owa*" { ACCESS::disable } }
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com