Skip to content

Commit 0fd6fb8

Browse files
authored
Update f5-big-ip-oracle-enterprise-business-suite-easy-button.md
1 parent 887d933 commit 0fd6fb8

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This scenario covers the classic Oracle EBS application that uses HTTP authoriza
3535

3636
Legacy applications lack modern protocols to support Azure AD integration. Modernization is costly, time consuming, and introduces downtime risk. Instead, use an F5 BIG-IP Application Delivery Controller (ADC) to bridge the gap between legacy applications and the modern ID control plane, with protocol transitioning.
3737

38-
A BIG-IP in front of the app enables overlay of the service with Azure AD preauthentication and header-based SSO. This configuration improve application security posture.
38+
A BIG-IP in front of the app enables overlay of the service with Azure AD preauthentication and header-based SSO. This configuration improves application security posture.
3939

4040
## Scenario architecture
4141

@@ -85,7 +85,7 @@ You need the following components:
8585

8686
## BIG-IP configuration method
8787

88-
This tutorial uses the Guided Configuration v16.1 Easy Button template. With the Easy Button, admins no longer go back and forth to enable services for SHA. The deployment and policy management is handled by the APM Guided Configuration wizard and Microsoft Graph. This integration ensures applications support identity federation, SSO, and Conditional Access, thus reducing administrative overhead.
88+
This tutorial uses the Guided Configuration v16.1 Easy Button template. With the Easy Button, admins no longer go back and forth to enable services for SHA. The APM Guided Configuration wizard and Microsoft Graph handle deployment and policy management. This integration ensures applications support identity federation, SSO, and Conditional Access, thus reducing administrative overhead.
8989

9090
>[!NOTE]
9191
> Replace example strings or values with those in your environment.
@@ -143,7 +143,7 @@ Create a tenant app registration to authorize the Easy Button access to Graph. T
143143

144144
### Configuration Properties
145145

146-
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. The **Azure Service Account Details** section represents the client you registered in your Azure AD tenant, as an application. With these settings a BIG-IP OAuth client registers a SAML SP in your tenant, with SSO properties. Easy Button does this action for BIG-IP services published and enabled for SHA.
146+
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. The **Azure Service Account Details** section represents the client you registered in your Azure AD tenant, as an application. With these settings, a BIG-IP OAuth client registers a SAML SP in your tenant, with SSO properties. Easy Button does this action for BIG-IP services published and enabled for SHA.
147147

148148
To reduce time and effort, reuse global settings to publish other applications.
149149

@@ -203,7 +203,7 @@ Easy Button has application templates for Oracle PeopleSoft, Oracle E-Business S
203203
3. Next to the **Signing Key** and **Signing Certificate**, select the **refresh** icon.
204204
4. Locate the certificate you imported.
205205
5. In **Signing Key Passphrase**, enter the certificate password.
206-
6. (Optional) Enable **Signing Option**. This ensures BIG-IP accepts tokens and claims signed by Azure AD.
206+
6. (Optional) Enable **Signing Option**. This option ensures BIG-IP accepts tokens and claims signed by Azure AD.
207207

208208
![Screenshot of options and entries for Signing Key, Signing Certificate, and Signing Key Passphrase.](./media/f5-big-ip-easy-button-ldap/azure-configuration-sign-certificates.png)
209209

@@ -224,10 +224,10 @@ The **Additional User Attributes** tab supports distributed systems that require
224224
1. Enable the **Advanced Settings** option.
225225
2. Check the **LDAP Attributes** check box.
226226
3. In **Choose Authentication Server**, select **Create New**.
227-
4. Depending on your setup, select **Use pool** or **Direct** server connection mode. This provides the target LDAP service server address. For a single LDAP server, select **Direct**.
227+
4. Depending on your setup, select **Use pool** or **Direct** server connection mode for the target LDAP service server address. For a single LDAP server, select **Direct**.
228228
5. For **Service Port**, enter **3060** (Default), **3161** (Secure), or another port for the Oracle LDAP service.
229229
6. Enter a **Base Search DN**. Use the distinguished name (DN) to search for groups in a directory.
230-
7. For **Admin DN** enter the account distinguished name APM uses to authenticate LDAP queries.
230+
7. For **Admin DN**, enter the account distinguished name APM uses to authenticate LDAP queries.
231231
8. For **Admin Password**, enter the password.
232232

233233
![Screenshot of options and entries for Additional User Attributes.](./media/f5-big-ip-oracle/additional-user-attributes.png)
@@ -311,15 +311,15 @@ Use BIG-IP Session Management to define conditions for user session termination
311311

312312
To learn more, go to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
313313

314-
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminates the session between the BIG-IP and a client.
314+
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign out. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminates the session between the BIG-IP and a client.
315315

316316
See, Microsoft [My Apps](https://myapplications.microsoft.com/)
317317

318318
The SAML federation metadata for the published application is imported from the tenant. This action provides the APM with the SAML sign out endpoint for Azure AD. Then, SP-initiated sign out terminates the client and Azure AD session. Ensure the APM knows when a user signs out.
319319

320-
If you use the BIG-IP webtop portal to access published applications, a sign-out is processed by the APM to call the Azure AD sign-out endpoint. If you don't use the BIG-IP webtop portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. Ensure SP-initiated sign out triggers secure sessions terminatation. Add an SLO function to the applications **Sign out** button to redirect the client to the Azure AD SAML or BIG-IP sign-out endpoint. Find the SAML sign-out endpoint URL for your tenant in **App Registrations > Endpoints**.
320+
If you use the BIG-IP webtop portal to access published applications, APM processes a sign out to call the Azure AD sign out endpoint. If you don't use the BIG-IP webtop portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. Ensure SP-initiated sign out triggers secure sessions terminatation. Add an SLO function to the applications **Sign out** button to redirect the client to the Azure AD SAML or BIG-IP sign out endpoint. Find the SAML sign out endpoint URL for your tenant in **App Registrations > Endpoints**.
321321

322-
If you can't change the app, have the BIG-IP listen for the application sign-out call and then trigger SLO.
322+
If you can't change the app, have the BIG-IP listen for the application sign out call and then trigger SLO.
323323

324324
Learn more:
325325

@@ -349,7 +349,7 @@ Learn more: [Tutorial: Configure F5 BIG-IP’s Access Policy Manager for header-
349349

350350
### Manually change configurations
351351

352-
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Most configurations are automated by wizard templates.
352+
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Wizard templates automate most configurations.
353353

354354
1. Navigate to **Access > Guided Configuration**.
355355
2. On the right end of the row for your application configuration, select the **padlock** icon.

0 commit comments

Comments
 (0)