Skip to content

Commit 0d5ef1b

Browse files
Merge pull request #251105 from omondiatieno/sap-erp-easy
sap erp easy - UI updates
2 parents 691abeb + efc237e commit 0d5ef1b

File tree

1 file changed

+9
-11
lines changed

1 file changed

+9
-11
lines changed

articles/active-directory/manage-apps/f5-big-ip-sap-erp-easy-button.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this article, learn to secure SAP ERP using Azure Active Directory (Azure AD)
2121
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
2222
* [What is Conditional Access?](../conditional-access/overview.md)
2323
* Single sign-on (SSO) between Azure AD and BIG-IP published services
24-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
24+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
2525

2626
Learn more:
2727

@@ -69,8 +69,7 @@ SHA supports SP and IdP initiated flows. The following image illustrates the SP-
6969
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
7070
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
7171
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
72-
* An account with Azure AD Application Admin permissions
73-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
72+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
7473
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
7574
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
7675
* An SAP ERP environment configured for Kerberos authentication
@@ -92,14 +91,13 @@ See, [Quickstart: Register an application with the Microsoft identity platform](
9291

9392
Register the Easy Button client in Azure AD, then it's allowed to establish a trust between SAML SP instances of a BIG-IP published application, and Azure AD as the SAML IdP.
9493

95-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
96-
2. In the left navigation pane, select the **Azure Active Directory** service.
97-
3. Under Manage, select **App registrations > New registration**.
98-
4. Enter a **Name**.
99-
5. In **Accounts in this organizational directory only**, specify who can use the application.
100-
6. Select **Register**.
101-
7. Navigate to **API permissions**.
102-
8. Authorize the following Microsoft Graph Application permissions:
94+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
95+
2. Browse to **Identity** > **Applications** > **App registrations** > **New registration**.
96+
3. Enter a **Name** for the new application.
97+
4. In **Accounts in this organizational directory only**, specify who can use the application.
98+
5. Select **Register**.
99+
6. Navigate to **API permissions**.
100+
7. Authorize the following Microsoft Graph Application permissions:
103101

104102
* Application.Read.All
105103
* Application.ReadWrite.All

0 commit comments

Comments
 (0)