Manual Chapter : Setting up client side directory

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 15.0.1, 15.0.0, 14.1.2, 14.1.0, 14.0.0, 13.1.3, 13.1.1, 13.1.0, 13.0.1, 13.0.0, 12.1.5, 12.1.3, 11.6.3, 11.5.7
Manual Chapter

Setting up client side directory

Connecting Windows 10 to Azure active directory

In Windows 10, an Azure AD user account is called a Work or school account. To join to or register on Azure AD requires Windows 10 PRO, Education or Enterprise edition. To connect to Azure active directory:
  1. Open Windows Settings, click Accounts > Access work or school .
    1. For applied Condition Access settings, click Connect to Azure Active Directory. Enter the email address and password of Azure AD account.
    2. For connect to MDM Intune, click Connect. Enter the email address and password of Azure AD account.
  2. Login to the Azure Active Directory account on the client machine.
  3. Install F5 Access from the Microsoft store. Ensure that the F5 VPN server address is trusted for the client.

Accessing F5 Access logs

To view the admin log:

  1. Open Event Viewer.
  2. Expand Applications and Services Log.
  3. Click Microsoft > Windows > Vpn Plugin Platform > OperationalVerbose .

Viewing configuration for F5 Access

To verify existing configuration applied to F5 Access, run the following command in PowerShell:

Get-WmiObject -Namespace root\cimv2\mdm\dmmap -Class MDM_VPNv2_01

Get-WmiObject command

Get-WmiObject command