Skip to content

Commit 48a0501

Browse files
authored
Consistency updates
1 parent 55a2946 commit 48a0501

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -41,13 +41,13 @@ The secure hybrid access solution for this scenario is made up of several compon
4141

4242
**Oracle EBS Application:** BIG-IP published service to be protected by Azure AD SHA.
4343

44-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP.
44+
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
4545

4646
**Oracle Internet Directory (OID):** Hosts the user database. BIG-IP checks via LDAP for authorization attributes.
4747

4848
**Oracle AccessGate:** Validates authorization attributes through back channel with OID service, before issuing EBS access cookies
4949

50-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
50+
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle application.
5151

5252
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
5353

@@ -58,8 +58,8 @@ SHA for this scenario supports both SP and IdP initiated flows. The following im
5858
| 1| User connects to application endpoint (BIG-IP) |
5959
| 2| BIG-IP APM access policy redirects user to Azure AD (SAML IdP) |
6060
| 3| Azure AD pre-authenticates user and applies any enforced Conditional Access policies |
61-
| 4| User is redirected back to BIG-IP with issued token and claims |
62-
| 5| BIG-IP authenticates user and performs LDAP query for user Unique ID (UID) attribute |
61+
| 4| User is redirected back to BIG-IP (SAML SP) and SSO is performed using issued SAML token |
62+
| 5| BIG-IP performs LDAP query for users Unique ID (UID) attribute |
6363
| 6| BIG-IP injects returned UID attribute as user_orclguid header in EBS session cookie request to Oracle AccessGate |
6464
| 7| Oracle AccessGate validates UID against Oracle Internet Directory (OID) service and issues EBS access cookie
6565
| 8| EBS user headers and cookie sent to application and returns the payload to the user |
@@ -86,7 +86,7 @@ Prior BIG-IP experience isn’t necessary, but you need:
8686

8787
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
8888

89-
* [SSL certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS
89+
* An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
9090

9191
* An existing Oracle EBS suite including Oracle AccessGate and an LDAP enabled OID (Oracle Internet Database)
9292

@@ -170,7 +170,7 @@ Some of these are global settings so can be re-used for publishing more applicat
170170

171171
The **Service Provider** settings define the SAML SP properties for the APM instance representing the application protected through SHA.
172172

173-
1. Enter **Host**. This is the public FQDN of the application being secured. You need a corresponding DNS record for clients to resolve this address, but using a localhost record is fine during testing
173+
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
174174

175175
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
176176

@@ -226,7 +226,7 @@ This section defines all properties that you would normally use to manually conf
226226

227227
When a user successfully authenticates, Azure AD issues a SAML token with a default set of claims and attributes uniquely identifying the user. The **User Attributes & Claims** tab shows the default claims to issue for the new application. It also lets you configure more claims.
228228

229-
![Screenshot for Azure configuration – User attributes & claims](./media/f5-big-ip-easy-button-ldap/user-attributes-claims.png)
229+
![Screenshot for user attributes and claims](./media/f5-big-ip-kerberos-easy-button/user-attributes-claims.png)
230230

231231
You can include additional Azure AD attributes if necessary, but the Oracle EBS scenario only requires the default attributes.
232232

@@ -285,7 +285,7 @@ To select a policy to be applied to the application being published:
285285

286286
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for client requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
287287

288-
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP.
288+
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
289289

290290
2. Enter **Service Port** as *443* for HTTPS
291291

0 commit comments

Comments
 (0)