24-Feb-2021 20:17
Hello,
I configured an F5 App using Kerberos Authentication along with Azure AD. But at the moment I want to make the same App ready for NTLM Auth using Azure AD.
Reference Doc I am following is this. Question is how/what I need to modify to change it to NTLM Based from Kerberos Based Application.
https://blog.azureinfra.com/2019/04/29/f5-big-ip-aad-basic-ntlm/
27-Feb-2021 01:30
can't tell you from my mind fully, but as you already have Azure AD setup with Kerberos working and you have a good guide for Azure AD setup with NTLM, can't you compare the two and work it out?
or even build the NTLM one next to your current one and move over once it works?
the big difference will be that you need to ask for the password as that is needed for NTLM and not for Kerberos. your SSO object will change from Kerberos to NTLM or Basic as shown in the page you. Which means your backend server will also need to allow one of those.
02-Mar-2021 08:41
Actually Kerberos one was not working it was setup and when tested it did not work and Backend App was not ready for Kerberos hence whatever configured for Kerberos trying to move to NTLM.
When user tries it shows error as attached. Please advise if you get a hint from it.
One quick note is when user tries they get the Microsoft Landing page , they try to authenticate using email address and I have been told they have to try using email address as user name. However user tested with "DomainName\Username" it did not work too. Azure side they see the log for Authentication as passed but I see error at F5 side as attached.
I will also match as you mentioned above.
02-Mar-2021 10:21
a quick search on the error throws up a couple of possible leads, this one seems most useful to check:
https://www.devcentral.f5.com/s/question/0D51T00007HRNdd/authentication-via-azure-ad-blocked-by-access-policy
15-Mar-2021 11:10
Hello ,
After I do medadata import / export manually seems application is accessible with some caveats. I need to fix it.
Problem now user gets too many authentication ask
I attached APM Log and APM Policy screenshot if it helps.
I also checked that if user put wrong password at F5 Form it does not allow to move forward.
Question is why user is authenticated 3 times and how I can resolve it ? APM Log says " Could not fine SSO username, check SSO credential mapping agent setting" no idea why it shows this error and does it give any clue ?
15-Mar-2021 11:11
15-Mar-2021 11:12
15-Mar-2021 11:12
15-Mar-2021 11:12
21-Mar-2021 08:24
something goes wrong in your set sAMAccountName VPE, can you share the content?
25-Mar-2021 15:44
Hello,
Here I attached the entry for sAMAccountName.
25-Mar-2021 23:43
sorry i asked for the wrong one i believe, it is probably the first variable assign the one where you use: session.logon.last.usernameUPN.
also can you show the SSO mapping settings?
01-Apr-2021 11:51
Here I attached 1st value of 1st Variable assign
01-Apr-2021 11:55
01-Apr-2021 11:56
Attached SSO Attachment as well
02-Apr-2021 03:05
have a good look at your APM variables after you logged in to Azure AD.
for me the username was in session.saml.last.attr.name.Identity. but it might be different depending on what your Azure AD claims are. login, check the APM variables for the session and then check where it what you need.
i do assume you assign session.logon.last.usernameUPN in the SSO mapping object?
06-Apr-2021 20:08
Attached Azure Side User Attribute and Claim Entry.
11-Apr-2021 06:33
SSO Credential Mapping VPE, though i now see you use it in the SSO element
so it is fixing that mapping, session.saml.last.attr.name.Identity sounds logical, did you already try that? still be to look into your APM session variables to double check.