You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-sap-erp-easy-button.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ In this article, learn to secure SAP ERP using Azure Active Directory (Azure AD)
21
21
*[Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
22
22
*[What is Conditional Access?](../conditional-access/overview.md)
23
23
* Single sign-on (SSO) between Azure AD and BIG-IP published services
24
-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
24
+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
25
25
26
26
Learn more:
27
27
@@ -69,8 +69,7 @@ SHA supports SP and IdP initiated flows. The following image illustrates the SP-
69
69
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
70
70
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
71
71
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
72
-
* An account with Azure AD Application Admin permissions
73
-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
72
+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
74
73
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
75
74
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
76
75
* An SAP ERP environment configured for Kerberos authentication
@@ -92,14 +91,13 @@ See, [Quickstart: Register an application with the Microsoft identity platform](
92
91
93
92
Register the Easy Button client in Azure AD, then it's allowed to establish a trust between SAML SP instances of a BIG-IP published application, and Azure AD as the SAML IdP.
94
93
95
-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
96
-
2. In the left navigation pane, select the **Azure Active Directory** service.
97
-
3. Under Manage, select **App registrations > New registration**.
98
-
4. Enter a **Name**.
99
-
5. In **Accounts in this organizational directory only**, specify who can use the application.
100
-
6. Select **Register**.
101
-
7. Navigate to **API permissions**.
102
-
8. Authorize the following Microsoft Graph Application permissions:
94
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
0 commit comments