You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/datawiza-azure-ad-sso-oracle-jde.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,26 +86,25 @@ To integrate Oracle JDE with Azure AD:
86
86
87
87

88
88
89
-
8. On the **Configure IdP** dialog, enter information.
89
+
12. On the **Configure IdP** dialog, enter information.
90
90
91
91
>[!Note]
92
92
>Use DCMC one-click integration to help complete Azure AD configuration. DCMC calls the Graph API to create an application registration on your behalf in your Azure AD tenant. Go to docs.datawiza.com for [One Click Integration With Azure AD](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html).
93
93
94
-
9. Select **Create**.
94
+
13. Select **Create**.
95
95
96
96

97
97
98
-
10. The DAP deployment page appears.
99
-
11. Make a note of the deployment Docker Compose file. The file includes the DAP image, Provisioning Key, and Provision Secret, which pulls the latest configuration and policies from DCMC.
98
+
14. The DAP deployment page appears.
99
+
15. Make a note of the deployment Docker Compose file. The file includes the DAP image, Provisioning Key, and Provision Secret, which pulls the latest configuration and policies from DCMC.
100
100
101
101

102
102
103
-
104
103
## SSO and HTTP headers
105
104
106
105
DAP gets user attributes from IdP and passes them to the upstream application with a header or cookie.
107
106
108
-
The Oracle JDE application needs to recognize the user. Using a name, the application instructs DAP to pass the values from the IdP to the application through the HTTP header.
107
+
The Oracle JDE application needs to recognize the user: using a name, the application instructs DAP to pass the values from the IdP to the application through the HTTP header.
109
108
110
109
1. In Oracle JDE, from the left navigation, select **Applications**.
111
110
2. Select the **Attribute Pass** subtab.
@@ -131,12 +130,12 @@ The Oracle JDE application needs to recognize the user. Using a name, the applic
131
130
132
131
7. Select **Enable SSL**.
133
132
134
-
6. From the **Cert Type** dropdown, select a type.
133
+
8. From the **Cert Type** dropdown, select a type.
135
134
136
135

137
136
138
137
139
-
7. For testing purposes, we'll be providing a self-signed certificate.
138
+
9. For testing purposes, we'll be providing a self-signed certificate.
140
139
141
140

142
141
@@ -145,7 +144,7 @@ The Oracle JDE application needs to recognize the user. Using a name, the applic
145
144
146
145

147
146
148
-
8. Select **Save**.
147
+
10. Select **Save**.
149
148
150
149
## Enable Azure AD Multi-Factor Authentication
151
150
@@ -187,5 +186,5 @@ To confirm Oracle JDE application access occurs, a prompt appears to use an Azur
187
186
188
187
* Video [Enable SSO and MFA for Oracle JDE) with Azure AD via Datawiza](https://www.youtube.com/watch?v=_gUGWHT5m90)
189
188
*[Tutorial: Configure Secure Hybrid Access with Azure AD and Datawiza](./datawiza-with-azure-ad.md)
190
-
*[Tutorial: Configure Azure AD B2C with Datawiza to provide secure hybrid acces](../../active-directory-b2c/partner-datawiza.md)
189
+
*[Tutorial: Configure Azure AD B2C with Datawiza to provide secure hybrid access](../../active-directory-b2c/partner-datawiza.md)
191
190
* Go to docs.datawiza.com for Datawiza [User Guides](https://docs.datawiza.com/)
0 commit comments