You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle EBS
17
17
18
-
In this article, learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), through F5’s BIG-IP Easy Button guided configuration.
19
-
20
-
Integrating a BIG-IP with Azure AD provides many benefits, including:
21
-
22
-
*[Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](../conditional-access/overview.md)
18
+
Learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
23
19
20
+
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
21
+
* See, [What is Conditional Access?](../conditional-access/overview.md)
22
+
* See, [Zero Trust security](../../security/fundamentals/zero-trust.md)
24
23
* Full SSO between Azure AD and BIG-IP published services
24
+
* Managed identities and access from one control plane
25
+
* See, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
25
26
26
-
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
27
+
Learn more:
27
28
28
-
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
29
+
*[Integrate F5 BIG-IP with Azure AD](./f5-aad-integration.md)
30
+
*[Enable SSO for an enterprise application](add-application-portal-setup-sso.md)
29
31
30
32
## Scenario description
31
33
32
-
This scenario looks at the classic **Oracle EBS application** that uses **HTTP authorization headers** to manage access to protected content.
34
+
This scenario covers the classic Oracle EBS application that uses HTTP authorization headers to manage access to protected content.
33
35
34
-
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
36
+
Legacy applications lack modern protocols to support Azure AD integration. Modernization is costly, time consuming, and introduces downtime risk. Instead, use an F5 BIG-IP Application Delivery Controller (ADC) to bridge the gap between legacy applications and the modern ID control plane, with protocol transitioning.
35
37
36
-
Having a BIG-IP in front of the app enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application.
38
+
A BIG-IP in front of the app enables overlay of the service with Azure AD preauthentication and header-based SSO. This configuration improve application security posture.
37
39
38
40
## Scenario architecture
39
41
40
-
The secure hybrid access solution for this scenario is made up of several components including a multi-tiered Oracle architecture:
41
-
42
-
**Oracle EBS Application:** BIG-IP published service to be protected by Azure AD SHA.
43
-
44
-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
42
+
The secure hybrid access (SHA) solution has the following components:
45
43
46
-
**Oracle Internet Directory (OID):** Hosts the user database. BIG-IP checks via LDAP for authorization attributes.
44
+
***Oracle EBS application** - BIG-IP published service to be protected by Azure AD SHA
45
+
***Azure AD** - Security Assertion Markup Language (SAML) identity provider (IdP) that verifies user credentials, Conditional Access, and SAML-based SSO to the BIG-IP
46
+
* With SSO, Azure AD provides BIG-IP session attributes
47
+
***Oracle Internet Directory (OID)** - hosts the user database.
48
+
* BIG-IP verifies authorization attributes with LDAP.
49
+
***Oracle E-Business Suite AccessGate** - before issuing EBS access cookies, it validates authorization attributes with the OID service
50
+
***BIG-IP** - reverse-proxy and SAML service provider (SP) to the application.
51
+
* Before header-based SSO to the Oracle application, authentication is delegated to the SAML IdP
47
52
48
-
**Oracle AccessGate:** Validates authorization attributes through back channel with OID service, before issuing EBS access cookies
53
+
SHA supports SP- and IdP-initiated flows. The following diagram illustrates the SP-initiated flow.
49
54
50
-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle application.
55
+

51
56
52
-
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
82
-
83
-
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php).
84
-
85
-
* User identities [synchronized](../hybrid/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD or created directly within Azure AD and flowed back to your on-premises directory
86
-
87
-
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
88
-
89
-
* An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
90
-
91
-
* An existing Oracle EBS suite including Oracle AccessGate and an LDAP enabled OID (Oracle Internet Database)
78
+
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
79
+
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php).
80
+
* User identities synchronized from an on-premises directory to Azure AD
81
+
*[Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
82
+
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
83
+
* See, [SSL profile](./f5-bigip-deployment-guide.md#ssl-profile)
84
+
* An Oracle EBS Suite, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
92
85
93
86
## BIG-IP configuration methods
94
87
@@ -97,7 +90,7 @@ There are many methods to configure BIG-IP for this scenario, including two temp
97
90
>[!NOTE]
98
91
> All example strings or values referenced throughout this guide should be replaced with those for your actual environment.
99
92
100
-
## Register Easy Button
93
+
## Register the Easy Button
101
94
102
95
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](../develop/quickstart-register-app.md)
0 commit comments