You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md
+56-62Lines changed: 56 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,32 +83,29 @@ You need the following components:
83
83
* See, [SSL profile](./f5-bigip-deployment-guide.md#ssl-profile)
84
84
* An Oracle EBS Suite, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
85
85
86
-
## BIG-IP configuration methods
86
+
## BIG-IP configuration method
87
87
88
-
There are many methods to configure BIG-IP for this scenario, including two template-based options and an advanced configuration. This tutorial covers the latest Guided Configuration 16.1 offering an Easy button template. With the Easy Button, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures that applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, reducing administrative overhead.
88
+
This tutorial uses the Guided Configuration v16.1 Easy Button template. With the Easy Button, admins no longer go back and forth to enable services for SHA. The deployment and policy management is handled by the APM Guided Configuration wizard and Microsoft Graph. This integration ensures applications support identity federation, SSO, and Conditional Access, thus reducing administrative overhead.
89
89
90
-
>[!NOTE]
91
-
> All example strings or values referenced throughout this guide should be replaced with those for your actual environment.
90
+
>[!NOTE]
91
+
> Replace example strings or values with those in your environment.
92
92
93
93
## Register the Easy Button
94
94
95
-
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](../develop/quickstart-register-app.md)
96
-
97
-
This first step creates a tenant app registration that will be used to authorize the **Easy Button** access to Graph. Through these permissions, the BIG-IP will be allowed to push the configurations required to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
98
-
99
-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Application Administrative rights
100
-
101
-
2. From the left navigation pane, select the **Azure Active Directory** service
102
-
103
-
3. Under Manage, select **App registrations > New registration**
95
+
Before a client or service accesses Microsoft Graph, the Microsoft identity platform must trust it.
104
96
105
-
4. Enter a display name for your application. For example, F5 BIG-IP Easy Button
97
+
Learn more: [Quickstart: Register an application with the Microsoft identity platform](../develop/quickstart-register-app.md)
106
98
107
-
5. Specify who can use the application > **Accounts in this organizational directory only**
99
+
Create a tenant app registration to authorize the Easy Button access to Graph. The BIG-IP pushes configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
108
100
109
-
6. Select **Register** to complete the initial app registration
110
-
111
-
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
101
+
1. Sign in to the [Azure portal](https://portal.azure.com/) with Application Administrative permissions.
102
+
2. In the left navigation pane, select the **Azure Active Directory** service.
103
+
3. Under **Manage**, select **App registrations > New registration**.
104
+
4. Enter an application **Name**. For example, F5 BIG-IP Easy Button.
105
+
5. Specify who can use the application > **Accounts in this organizational directory only**.
106
+
6. Select **Register**.
107
+
7. Navigate to **API permissions**.
108
+
8. Authorize the following Microsoft Graph **Application permissions**:
112
109
113
110
* Application.Read.All
114
111
* Application.ReadWrite.All
@@ -121,75 +118,72 @@ This first step creates a tenant app registration that will be used to authorize
121
118
* Policy.ReadWrite.ConditionalAccess
122
119
* User.Read.All
123
120
124
-
8. Grant admin consent for your organization
125
-
126
-
9. Go to **Certificates & Secrets**, generate a new **Client secret** and note it down
127
-
128
-
10. Go to **Overview**, note the **Client ID** and **Tenant ID**
129
-
130
-
## Configure Easy Button
121
+
9. Grant admin consent for your organization.
122
+
10. Go to **Certificates & Secrets**.
123
+
11. Generate a new **Client Secret**. Make a note of the Client Secret.
124
+
12. Go to **Overview**. Make a note of the Client ID and Tenant ID.
131
125
132
-
Initiate the APM's **Guided Configuration** to launch the **Easy Button** Template.
126
+
## Configure the Easy Button
133
127
134
-
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
128
+
1. Initiate the APM **Guided Configuration**.
129
+
2. Start the **Easy Button** template.
130
+
3. Navigate to **Access > Guided Configuration > Microsoft Integration**.
131
+
4. Select **Azure AD Application**.
135
132
136
-

133
+

137
134
138
-
2. Review the list of configuration steps and select **Next**
135
+
5. Review the configuration options.
136
+
6. Select **Next**.
139
137
140
-

138
+

141
139
142
-
3. Follow the sequence of steps required to publish your application.
140
+
7. Use the graphic to help publish your application.

145
143
146
144
### Configuration Properties
147
145
148
-
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. Consider the **Azure Service Account Details** section to represent the client you registered in your Azure AD tenant earlier, as an application. These settings allow a BIG-IP's OAuth client to individually register a SAML SP directly in your tenant, along with the SSO properties you would normally configure manually. Easy Button does this for every BIG-IP service being published and enabled for SHA.
146
+
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. The **Azure Service Account Details** section represents the client you registered in your Azure AD tenant, as an application. With these settings a BIG-IP OAuth client registers a SAML SP in your tenant, with SSO properties. Easy Button does this action for BIG-IP services published and enabled for SHA.
149
147
150
-
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
148
+
To reduce time and effort, reuse global settings to publish other applications.
151
149
152
-
1. Provide a unique **Configuration Name** that enables an admin to easily distinguish between Easy Button configurations
150
+
1. Enter a **Configuration Name**.
151
+
2. For **Single Sign-On (SSO) & HTTP Headers**, select **On**.
152
+
3. For **Tenant ID, Client ID**, and **Client Secret** enter what you noted during Easy Button client registration.
153
+
4. Confirm the BIG-IP connects to your tenant.
154
+
5. Select **Next**.
153
155
154
-
2. Enable **Single Sign-On (SSO) & HTTP Headers**
155
-
156
-
3. Enter the **Tenant Id, Client ID**, and **Client Secret** you noted when registering the Easy Button client in your tenant.
157
-
158
-
4. Before you select **Next**, confirm the BIG-IP can successfully connect to your tenant.
159
-
160
-

156
+

161
157
162
158
### Service Provider
163
159
164
-
The Service Provider settings define the properties for the SAML SP instance of the application protected through SHA.
165
-
166
-
1. Enter **Host**. This is the public FQDN of the application being secured
167
-
168
-
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
169
-
170
-

171
-
172
-
Next, under optional **Security Settings** specify whether Azure AD should encrypt issued SAML assertions. Encrypting assertions between Azure AD and the BIG-IP APM provides assurance that the content tokens can’t be intercepted, and personal or corporate data be compromised.
173
-
174
-
3. From the **Assertion Decryption Private Key** list, select **Create New**
160
+
Use Service Provider settings for the properties of the SAML SP instance of the protected application.
175
161
176
-

162
+
1. For **Host**, enter the public FQDN of the application.
163
+
2. For **Entity ID**, enter the identifier Azure AD uses for the SAML SP requesting a token.
177
164
178
-
4. Select **OK**. This opens the **Import SSL Certificate and Keys** dialog in a new tab
165
+

179
166
180
-
5. Select **PKCS 12 (IIS)** to import your certificate and private key. Once provisioned close the browser tab to return to the main tab.
167
+
3. (Optional) In **Security Settings**, select or clear the **Enable Encrypted Assertion** option. Encrypting assertions between Azure AD and the BIG-IP APM means the content tokens can’t be intercepted, nor personal or corporate data compromised.
168
+
4. From the **Assertion Decryption Private Key** list, select **Create New**
181
169
182
-

170
+

183
171
184
-
6. Check **Enable Encrypted Assertion**
172
+
5. Select **OK**.
173
+
6. The **Import SSL Certificate and Keys** dialog appears in a new tab.
174
+
7. Select **PKCS 12 (IIS)**.
175
+
8. The certificate and private key are imported.
176
+
9. Close the browser tab to return to the main tab.
185
177
186
-
7. If you have enabled encryption, select your certificate from the **Assertion Decryption Private Key** list. This is the private key for the certificate that BIG-IP APM uses to decrypt Azure AD assertions
178
+

187
179
188
-
8. If you have enabled encryption, select your certificate from the **Assertion Decryption Certificate** list. This is the certificate that BIG-IP uploads to Azure AD for encrypting the issued SAML assertions.
180
+
6. Select **Enable Encrypted Assertion**.
181
+
7. For enabled encryption, from the **Assertion Decryption Private Key** list, select the certificate private key BIG-IP APM uses to decrypt Azure AD assertions.
182
+
8. For enabled encryption,from the **Assertion Decryption Certificate** list, select the certificate BIG-IP uploads to Azure AD to encrypt the issued SAML assertions.
189
183
190
-

184
+

191
185
192
-
### Azure Active Directory
186
+
### Azure AD
193
187
194
188
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant. Easy Button provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. For this scenario select **Oracle E-Business Suite > Add**.
0 commit comments