Skip to content

Commit 26f369a

Browse files
authored
Merge pull request #226668 from lauradolan/sync
Dirty PR to fix merge conflicts in release-sap-architecture
2 parents 7596840 + 26bb741 commit 26f369a

File tree

69 files changed

+942
-843
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+942
-843
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/11/2022
12+
ms.date: 02/07/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6767
1. Select **Certificates & secrets**, and then select **New client secret**.
6868
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
6969
70-
### Configuring optional claims
71-
72-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73-
74-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77-
1. In the Azure portal, search for and select **Azure Active Directory**.
78-
1. In the left menu, under **Manage**, select **App registrations**.
79-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80-
1. From the **Manage** section, select **Token configuration**.
81-
1. Select **Add optional claim**.
82-
1. For the **Token type**, select **ID**.
83-
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85-
86-
## [Optional] Verify your app authenticity
87-
88-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89-
9070
::: zone pivot="b2c-user-flow"
9171
9272
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254234

255235
::: zone-end
256236

237+
### [Optional] Configuring optional claims
238+
239+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240+
241+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244+
1. In the Azure portal, search for and select **Azure Active Directory**.
245+
1. In the left menu, under **Manage**, select **App registrations**.
246+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247+
1. From the **Manage** section, select **Token configuration**.
248+
1. Select **Add optional claim**.
249+
1. For the **Token type**, select **ID**.
250+
1. Select the optional claims to add, `family_name` and `given_name`.
251+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252+
253+
## [Optional] Verify your app authenticity
254+
255+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256+
257257
## Next steps
258258

259259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ Enable *seamless SSO* by doing the following:
145145

146146
`Import-Module .\AzureADSSO.psd1`
147147

148-
4. Run PowerShell as an administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command opens a pane where you can enter your tenant's Hybrid Identity Administratoristrator credentials.
148+
4. Run PowerShell as an administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command opens a pane where you can enter your tenant's Hybrid Identity Administrator credentials.
149149

150150
5. Call `Get-AzureADSSOStatus | ConvertFrom-Json`. This command displays a list of Active Directory forests (see the "Domains" list) on which this feature has been enabled. By default, it is set to false at the tenant level.
151151

Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,133 @@
1+
---
2+
title: Azure Active Directory SSO integration with Oracle Access Manager for Oracle E-Business Suite
3+
description: Learn how to configure single sign-on between Azure Active Directory and Oracle Access Manager for Oracle E-Business Suite.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 02/07/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with Oracle Access Manager for Oracle E-Business Suite
18+
19+
In this article, you'll learn how to integrate Oracle Access Manager for Oracle E-Business Suite with Azure Active Directory (Azure AD). When you integrate Oracle Access Manager for Oracle E-Business Suite with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Oracle Access Manager for Oracle E-Business Suite.
22+
* Enable your users to be automatically signed-in to Oracle Access Manager for Oracle E-Business Suite with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You'll configure and test Azure AD single sign-on for Oracle Access Manager for Oracle E-Business Suite in a test environment. Oracle Access Manager for Oracle E-Business Suite supports only **SP** initiated single sign-on.
26+
27+
> [!NOTE]
28+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
29+
30+
## Prerequisites
31+
32+
To integrate Azure Active Directory with Oracle Access Manager for Oracle E-Business Suite, you need:
33+
34+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* Oracle Access Manager for Oracle E-Business Suite single sign-on (SSO) enabled subscription.
38+
39+
## Add application and assign a test user
40+
41+
Before you begin the process of configuring single sign-on, you need to add the Oracle Access Manager for Oracle E-Business Suite application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
42+
43+
### Add Oracle Access Manager for Oracle E-Business Suite from the Azure AD gallery
44+
45+
Add Oracle Access Manager for Oracle E-Business Suite from the Azure AD application gallery to configure single sign-on with Oracle Access Manager for Oracle E-Business Suite. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
46+
47+
### Create and assign Azure AD test user
48+
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
50+
51+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
52+
53+
## Configure Azure AD SSO
54+
55+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
56+
57+
1. In the Azure portal, on the **Oracle Access Manager for Oracle E-Business Suite** application integration page, find the **Manage** section and select **single sign-on**.
58+
1. On the **Select a single sign-on method** page, select **SAML**.
59+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
60+
61+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
62+
63+
1. On the **Basic SAML Configuration** section, perform the following steps:
64+
65+
a. In the **Identifier** textbox, type a URL using the following pattern: ` https://<SUBDOMAIN>.oraclecloud.com/`
66+
67+
b. In the **Reply URL** textbox, type a URL using the following pattern: `https://<SUBDOMAIN>.oraclecloud.com/v1/saml/<UNIQUEID>>`
68+
69+
c. In the **Sign on URL** textbox, type a URL using the following pattern:
70+
` https://<SUBDOMAIN>.oraclecloud.com/`
71+
72+
1. Your Oracle Access Manager for Oracle E-Business Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Oracle Access Manager for Oracle E-Business Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
73+
74+
![image](common/default-attributes.png)
75+
76+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
77+
78+
![The Certificate download link](common/metadataxml.png)
79+
80+
## Configure Oracle Access Manager for Oracle E-Business Suite SSO
81+
82+
1. Sign to the Oracle Access Manager console as an Administrator.
83+
1. Click the **Federation** tab at the top of the console.
84+
1. In the **Federation** area of the **Launch Pad** tab, click **Service Provider Management**.
85+
1. On the Service Provider Administration tab, click **Create Identity Provider Partner**.
86+
1. In the **General** area, enter a name for the **Identity Provider partner** and select both **Enable Partner and Default Identity Provider Partner**. Go to the next step before saving.
87+
1. In the **Service Information** area:
88+
89+
a. Select **SAML2.0** as the protocol.
90+
91+
b. Select **Load from provider metadata**.
92+
93+
c. Click **Browse** (for Windows) or **Choose File** (for Mac) and select the **Federation Metadata XML** file that you downloaded from Azure portal.
94+
95+
d. Go to the next step before saving.
96+
97+
1. In the **Mapping Options** area:
98+
99+
a. Select the **User Identity Store** option that will be used as the Oracle Access Manager LDAP identity store that is checked for E-Business Suite users. Typically, this is already configured as the Oracle Access Manager identity store.
100+
101+
b. Leave **User Search Base DN** blank. The search base is automatically picked from the identity store configuration.
102+
103+
c. Select **Map assertion Name ID to User ID Store attribute** and enter mail in the text box.
104+
105+
1. Click **Save** to save the identity provider partner.
106+
1. After the partner is saved, come back to the **Advanced** area at the bottom of the tab. Ensure that the options are configured as follows:
107+
108+
a. **Enable global logout** is selected.
109+
110+
b. **HTTP POST SSO** Response Binding is selected.
111+
112+
### Create Oracle Access Manager for Oracle E-Business Suite test user
113+
114+
In this section, you create a user called Britta Simon at Oracle Access Manager for Oracle E-Business Suite. Work with [Oracle Access Manager for Oracle E-Business Suite support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html) to add the users in the Oracle Access Manager for Oracle E-Business Suite platform. Users must be created and activated before you use single sign-on.
115+
116+
## Test SSO
117+
118+
In this section, you test your Azure AD single sign-on configuration with following options.
119+
120+
* Click on **Test this application** in Azure portal. This will redirect to Oracle Access Manager for Oracle E-Business Suite Sign-on URL where you can initiate the login flow.
121+
122+
* Go to Oracle Access Manager for Oracle E-Business Suite Sign-on URL directly and initiate the login flow from there.
123+
124+
* You can use Microsoft My Apps. When you select the Oracle Access Manager for Oracle E-Business Suite tile in the My Apps, this will redirect to Oracle Access Manager for Oracle E-Business Suite Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
125+
126+
## Additional resources
127+
128+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
129+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
130+
131+
## Next steps
132+
133+
Once you configure Oracle Access Manager for Oracle E-Business Suite you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1707,6 +1707,8 @@
17071707
href: opsgenie-tutorial.md
17081708
- name: Optimizely
17091709
href: optimizely-tutorial.md
1710+
- name: Oracle Access Manager for Oracle E-Business Suite
1711+
href: oracle-access-manager-for-oracle-ebs-tutorial.md
17101712
- name: Oracle Cloud Infrastructure Console
17111713
href: oracle-cloud-tutorial.md
17121714
- name: Oracle Fusion ERP

articles/app-service/app-service-plan-manage.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,8 @@ You can create an empty App Service plan, or you can create a plan as part of ap
3939

4040
## Move an app to another App Service plan
4141

42-
You can move an app to another App Service plan, as long as the source plan and the target plan are in the _same resource group and geographical region_.
42+
You can move an app to another App Service plan, as long as the source plan and the target plan are in the _same resource group, geographical region,and of the same OS type_. Any change in type such as Windows to Linux or any type that is different from the originating type is not supported.
43+
4344

4445
> [!NOTE]
4546
> Azure deploys each new App Service plan into a deployment unit, internally called a webspace. Each region can have many webspaces, but your app can only move between plans that are created in the same webspace. An App Service Environment can have multiple webspaces, but your app can only move between plans that are created in the same webspace.

0 commit comments

Comments
 (0)