Skip to content

Commit 5edcd86

Browse files
Merge pull request #251100 from omondiatieno/idap-header-easy
idap-header _ UI updates
2 parents d96c553 + a43642d commit 5edcd86

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this article, you can learn to secure header and LDAP-based applications usin
2121
* Improved governance: See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) and learn more about Azure AD pre-authentication
2222
* See also, [What is Conditional Access?](../conditional-access/overview.md) to learn about how it helps enforce organizational policies
2323
* Full single sign-on (SSO) between Azure AD and BIG-IP published services
24-
* Manage identities and access from one control plane, the [Azure portal](https://portal.azure.com)
24+
* Manage identities and access from one control plane, the [Microsoft Entra admin center](https://entra.microsoft.com)
2525

2626
To learn about more benefits, see [F5 BIG-IP and Azure AD integration](./f5-integration.md).
2727

@@ -67,7 +67,7 @@ Prior BIG-IP experience isn't necessary, but you need:
6767
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
6868
- 90-day BIG-IP product [Free Trial](https://www.f5.com/trial/big-ip-trial.php)
6969
- User identities [synchronized](../hybrid/connect/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD
70-
- An account with Azure AD Application Admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
70+
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
7171
- An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certificates while testing
7272
- A header-based application or [set up a simple IIS header app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
7373
- A user directory that supports LDAP, such as Windows Active Directory Lightweight Directory Services (AD LDS), OpenLDAP etc.
@@ -87,13 +87,12 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
8787

8888
This first step creates a tenant app registration to authorize the **Easy Button** access to Graph. With these permissions, the BIG-IP can push the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
8989

90-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with Application Administrative rights.
91-
2. From the left navigation pane, select the **Azure Active Directory** service.
92-
3. Under Manage, select **App registrations > New registration**.
93-
4. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
94-
5. Specify who can use the application > **Accounts in this organizational directory only**.
95-
6. Select **Register**.
96-
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
90+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
91+
2. Browse to **Identity** > **Applications** > **App registrations** > **New registration**.
92+
3. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
93+
4. Specify who can use the application > **Accounts in this organizational directory only**.
94+
5. Select **Register**.
95+
6. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
9796

9897
* Application.Read.All
9998
* Application.ReadWrite.All

0 commit comments

Comments
 (0)