Skip to content

Commit 122e8ea

Browse files
authored
adjust list format, adjust capitalization, fix Acrolinx issue
1 parent 997d506 commit 122e8ea

File tree

1 file changed

+48
-48
lines changed

1 file changed

+48
-48
lines changed

articles/active-directory/saas-apps/oracle-cloud-tutorial.md

Lines changed: 48 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,11 @@ Configure and test Azure AD SSO with Oracle Cloud Infrastructure Console using a
5959
To configure and test Azure AD SSO with Oracle Cloud Infrastructure Console, complete the following building blocks:
6060

6161
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
62-
2. **[Configure Oracle Cloud Infrastructure Console](#configure-oracle-cloud-infrastructure-console)** to configure the SSO settings on application side.
63-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
64-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
65-
5. **[Create Oracle Cloud Infrastructure Console test user](#create-oracle-cloud-infrastructure-console-test-user)** to have a counterpart of B. Simon in Oracle Cloud Infrastructure Console that is linked to the Azure AD representation of user.
66-
6. **[Test SSO](#test-sso)** to verify whether the configuration works.
62+
1. **[Configure Oracle Cloud Infrastructure Console](#configure-oracle-cloud-infrastructure-console)** to configure the SSO settings on application side.
63+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
64+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
65+
1. **[Create Oracle Cloud Infrastructure Console test user](#create-oracle-cloud-infrastructure-console-test-user)** to have a counterpart of B. Simon in Oracle Cloud Infrastructure Console that is linked to the Azure AD representation of user.
66+
1. **[Test SSO](#test-sso)** to verify whether the configuration works.
6767

6868
### Configure Azure AD SSO
6969

@@ -77,59 +77,59 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7777

7878
1. On the **Basic SAML Configuration** page, enter the values for the following fields:
7979

80-
>[!NOTE]
81-
>You will get the Service Provider metadata file from the **Configure Oracle Cloud Infrastructure Console Single Sign-On** section of the tutorial.
80+
> [!NOTE]
81+
> You will get the Service Provider metadata file from the **Configure Oracle Cloud Infrastructure Console Single Sign-On** section of the tutorial.
8282
83-
a. Click **Upload metadata file**.
83+
1. Click **Upload metadata file**.
8484

85-
b. Click on **folder logo** to select the metadata file and click **Upload**.
85+
1. Click on **folder logo** to select the metadata file and click **Upload**.
8686

87-
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in **Basic SAML Configuration** section textbox.
87+
1. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in **Basic SAML Configuration** section textbox.
8888

89-
> [!NOTE]
90-
> If the **Identifier** and **Reply URL** values do not get auto polulated, then fill in the values manually according to your requirement.
89+
> [!NOTE]
90+
> If the **Identifier** and **Reply URL** values do not get auto polulated, then fill in the values manually according to your requirement.
9191
92-
In the **Sign-on URL** text box, type a URL using the following pattern:
93-
` https://console.<REGIONNAME>.oraclecloud.com/`
92+
In the **Sign-on URL** text box, type a URL using the following pattern:
93+
` https://console.<REGIONNAME>.oraclecloud.com/`
9494

95-
> [!NOTE]
96-
> The value is not real. Update the value with the actual Sign-On URL. Contact [Oracle Cloud Infrastructure Console Client support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95+
> [!NOTE]
96+
> The value is not real. Update the value with the actual Sign-On URL. Contact [Oracle Cloud Infrastructure Console Client support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9797
9898
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9999

100100
![The Certificate download link](common/metadataxml.png)
101101

102102
1. Oracle Cloud Infrastructure Console application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
103103

104-
![image](common/edit-attribute.png)
104+
![image](common/edit-attribute.png)
105105

106106
1. In addition to above, Oracle Cloud Infrastructure Console application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** section on the **Group Claims (Preview)** dialog, perform the following steps:
107107

108-
1. Click the **pen** next to **Name identifier value**.
108+
1. Click the **pen** next to **Name identifier value**.
109109

110-
1. Select **Persistent** as **Choose name identifier format**.
110+
1. Select **Persistent** as **Choose name identifier format**.
111111

112-
1. Click **Save**.
112+
1. Click **Save**.
113113

114-
![image](./media/oracle-cloud-tutorial/config07.png)
114+
![image](./media/oracle-cloud-tutorial/config07.png)
115115

116-
![image](./media/oracle-cloud-tutorial/config11.png)
116+
![image](./media/oracle-cloud-tutorial/config11.png)
117117

118-
1. Click the **pen** next to **Groups returned in claim**.
118+
1. Click the **pen** next to **Groups returned in claim**.
119119

120-
1. Select **Security groups** from the radio list.
120+
1. Select **Security groups** from the radio list.
121121

122-
1. Select **Source Attribute** of **Group ID**.
122+
1. Select **Source Attribute** of **Group ID**.
123123

124-
1. Check **Customize the name of the group claim**.
124+
1. Check **Customize the name of the group claim**.
125125

126-
1. In the **Name** text box, type **groupName**.
126+
1. In the **Name** text box, type **groupName**.
127127

128-
1. In the **Namespace (optional)** text box, type `https://auth.oraclecloud.com/saml/claims`.
128+
1. In the **Namespace (optional)** text box, type `https://auth.oraclecloud.com/saml/claims`.
129129

130-
1. Click **Save**.
130+
1. Click **Save**.
131131

132-
![image](./media/oracle-cloud-tutorial/config08.png)
132+
![image](./media/oracle-cloud-tutorial/config08.png)
133133

134134
1. On the **Set up Oracle Cloud Infrastructure Console** section, copy the appropriate URL(s) based on your requirement.
135135

@@ -139,35 +139,35 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
139139

140140
1. In a different web browser window, sign in to Oracle Cloud Infrastructure Console as an Administrator.
141141

142-
2. Click on the left side of the menu and click on **Identity** then navigate to **Federation**.
142+
1. Click on the left side of the menu and click on **Identity** then navigate to **Federation**.
143143

144-
![Configuration](./media/oracle-cloud-tutorial/config01.png)
144+
![Configuration](./media/oracle-cloud-tutorial/config01.png)
145145

146-
3. Save the **Service Provider metadata file** by clicking the **Download this document** link and upload it into the **Basic SAML Configuration** section of Azure portal and then click on **Add Identity Provider**.
146+
1. Save the **Service Provider metadata file** by clicking the **Download this document** link and upload it into the **Basic SAML Configuration** section of Azure portal and then click on **Add Identity Provider**.
147147

148-
![Configuration](./media/oracle-cloud-tutorial/config02.png)
148+
![Configuration](./media/oracle-cloud-tutorial/config02.png)
149149

150-
4. On the **Add Identity Provider** pop-up, perform the following steps:
150+
1. On the **Add Identity Provider** pop-up, perform the following steps:
151151

152-
![Configuration](./media/oracle-cloud-tutorial/config03.png)
152+
![Configuration](./media/oracle-cloud-tutorial/config03.png)
153153

154-
a. In the **NAME** text box, enter your name.
154+
1. In the **NAME** text box, enter your name.
155155

156-
b. In the **DESCRIPTION** text box, enter your description.
156+
1. In the **DESCRIPTION** text box, enter your description.
157157

158-
c. Select **MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICE (ADFS) OR SAML 2.0 COMPLIANT IDENTITY PROVIDER** as **TYPE**.
158+
1. Select **MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICE (ADFS) OR SAML 2.0 COMPLIANT IDENTITY PROVIDER** as **TYPE**.
159159

160-
d. Click **Browse** to upload the Federation Metadata XML, which you have downloaded from Azure portal.
160+
1. Click **Browse** to upload the Federation Metadata XML, which you have downloaded from Azure portal.
161161

162-
e. Click **Continue** and on the **Edit Identity Provider** section perform the following steps:
162+
1. Click **Continue** and on the **Edit Identity Provider** section perform the following steps:
163163

164-
![Configuration](./media/oracle-cloud-tutorial/config09.png)
164+
![Configuration](./media/oracle-cloud-tutorial/config09.png)
165165

166-
f. For **IDENTITY PROVIDER GROUP** fields, enter the group name and group id that are set up in Azure portal. The group needs to be mapped with corresponding group in **OCI GROUP** field.
166+
1. For **IDENTITY PROVIDER GROUP** fields, enter the group name and group ID that are set up in Azure portal. The group needs to be mapped with corresponding group in **OCI GROUP** field.
167167

168-
g. You can map multiple groups as per your setup in Azure portal and your organization need. Click on **+ Add mapping** to add as many groups as you need.
168+
1. You can map multiple groups as per your setup in Azure portal and your organization need. Click on **+ Add mapping** to add as many groups as you need.
169169

170-
h. Click **Submit**.
170+
1. Click **Submit**.
171171

172172
### Create an Azure AD test user
173173

@@ -193,7 +193,7 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
193193

194194
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
195195

196-
![The Add User link](common/add-assign-user.png)
196+
![The Add User link](common/add-assign-user.png)
197197

198198
1. In the **Users and groups** dialog, select **B. Simon** from the Users list, then click the **Select** button at the bottom of the screen.
199199
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
@@ -209,10 +209,10 @@ When you select the Oracle Cloud Infrastructure Console tile in the Access Panel
209209

210210
![Configuration](./media/oracle-cloud-tutorial/config10.png)
211211

212-
## Additional Resources
212+
## Additional resources
213213

214214
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
215215

216216
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
217217

218-
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
218+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)

0 commit comments

Comments
 (0)