You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -276,7 +276,7 @@ The **Application Pool tab** details the services behind a BIG-IP, represented a
276
276
277
277
2. Choose the **Load Balancing Method** as *Round Robin*
278
278
279
-
3.Update the **Pool Servers**. Select an existing node or specify an IP and port for the servers hosting the Oracle JDE application.
279
+
3.For **Pool Servers** select an existing node or specify an IP and port for the servers hosting the Oracle JDE application.
280
280
281
281

282
282
@@ -326,26 +326,26 @@ At that point, changes via the wizard UI are no longer possible, but all BIG-IP
326
326
327
327
## Troubleshooting
328
328
329
-
There can be many factors leading to failure to access a published application. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, policy violations, or misconfigured variable mappings.
330
-
331
-
Start troubleshooting by increasing the log verbosity level.
329
+
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
2. Select the row for your published application then **Edit > Access System Logs**
336
334
337
335
3. Select **Debug** from the SSO list then **OK**
338
336
339
-
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data. If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
337
+
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
338
+
339
+
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
340
340
341
341
1. Navigate to **Access > Overview > Access reports**
342
342
343
-
2. Run the report for the last hour to see logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
343
+
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
344
344
345
345
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
346
346
347
-
1. In which case you should head to **Access Policy > Overview > Active Sessions** and select the link for your active session
347
+
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
348
348
349
-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes
349
+
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
350
350
351
351
See [BIG-IP APM variable assign examples](https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference](https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.
0 commit comments