You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ In this article, you can learn to secure header and LDAP-based applications usin
21
21
* Improved governance: See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) and learn more about Azure AD pre-authentication
22
22
* See also, [What is Conditional Access?](../conditional-access/overview.md) to learn about how it helps enforce organizational policies
23
23
* Full single sign-on (SSO) between Azure AD and BIG-IP published services
24
-
* Manage identities and access from one control plane, the [Azure portal](https://portal.azure.com)
24
+
* Manage identities and access from one control plane, the [Microsoft Entra admin center](https://entra.microsoft.com)
25
25
26
26
To learn about more benefits, see [F5 BIG-IP and Azure AD integration](./f5-integration.md).
27
27
@@ -67,7 +67,7 @@ Prior BIG-IP experience isn't necessary, but you need:
67
67
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
- User identities [synchronized](../hybrid/connect/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD
70
-
-An account with Azure AD Application Admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
70
+
-One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
71
71
- An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certificates while testing
72
72
- A header-based application or [set up a simple IIS header app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
73
73
- A user directory that supports LDAP, such as Windows Active Directory Lightweight Directory Services (AD LDS), OpenLDAP etc.
@@ -87,13 +87,12 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
87
87
88
88
This first step creates a tenant app registration to authorize the **Easy Button** access to Graph. With these permissions, the BIG-IP can push the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
89
89
90
-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with Application Administrative rights.
91
-
2. From the left navigation pane, select the **Azure Active Directory** service.
92
-
3. Under Manage, select **App registrations > New registration**.
93
-
4. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
94
-
5. Specify who can use the application > **Accounts in this organizational directory only**.
95
-
6. Select **Register**.
96
-
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
90
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
0 commit comments