Skip to content

Commit 69d1106

Browse files
authored
Update f5-big-ip-oracle-enterprise-business-suite-easy-button.md
1 parent 44d641c commit 69d1106

File tree

1 file changed

+46
-53
lines changed

1 file changed

+46
-53
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 46 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -15,80 +15,73 @@ ms.collection: M365-identity-device-management
1515

1616
# Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle EBS
1717

18-
In this article, learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), through F5’s BIG-IP Easy Button guided configuration.
19-
20-
Integrating a BIG-IP with Azure AD provides many benefits, including:
21-
22-
* [Improved Zero Trust governance](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) through Azure AD pre-authentication and [Conditional Access](../conditional-access/overview.md)
18+
Learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
2319

20+
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
21+
* See, [What is Conditional Access?](../conditional-access/overview.md)
22+
* See, [Zero Trust security](../../security/fundamentals/zero-trust.md)
2423
* Full SSO between Azure AD and BIG-IP published services
24+
* Managed identities and access from one control plane
25+
* See, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
2526

26-
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
27+
Learn more:
2728

28-
To learn about all the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
29+
* [Integrate F5 BIG-IP with Azure AD](./f5-aad-integration.md)
30+
* [Enable SSO for an enterprise application](add-application-portal-setup-sso.md)
2931

3032
## Scenario description
3133

32-
This scenario looks at the classic **Oracle EBS application** that uses **HTTP authorization headers** to manage access to protected content.
34+
This scenario covers the classic Oracle EBS application that uses HTTP authorization headers to manage access to protected content.
3335

34-
Being legacy, the application lacks modern protocols to support a direct integration with Azure AD. The application can be modernized, but it is costly, requires careful planning, and introduces risk of potential downtime. Instead, an F5 BIG-IP Application Delivery Controller (ADC) is used to bridge the gap between the legacy application and the modern ID control plane, through protocol transitioning.
36+
Legacy applications lack modern protocols to support Azure AD integration. Modernization is costly, time consuming, and introduces downtime risk. Instead, use an F5 BIG-IP Application Delivery Controller (ADC) to bridge the gap between legacy applications and the modern ID control plane, with protocol transitioning.
3537

36-
Having a BIG-IP in front of the app enables us to overlay the service with Azure AD pre-authentication and header-based SSO, significantly improving the overall security posture of the application.
38+
A BIG-IP in front of the app enables overlay of the service with Azure AD preauthentication and header-based SSO. This configuration improve application security posture.
3739

3840
## Scenario architecture
3941

40-
The secure hybrid access solution for this scenario is made up of several components including a multi-tiered Oracle architecture:
41-
42-
**Oracle EBS Application:** BIG-IP published service to be protected by Azure AD SHA.
43-
44-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
42+
The secure hybrid access (SHA) solution has the following components:
4543

46-
**Oracle Internet Directory (OID):** Hosts the user database. BIG-IP checks via LDAP for authorization attributes.
44+
* **Oracle EBS application** - BIG-IP published service to be protected by Azure AD SHA
45+
* **Azure AD** - Security Assertion Markup Language (SAML) identity provider (IdP) that verifies user credentials, Conditional Access, and SAML-based SSO to the BIG-IP
46+
* With SSO, Azure AD provides BIG-IP session attributes
47+
* **Oracle Internet Directory (OID)** - hosts the user database.
48+
* BIG-IP verifies authorization attributes with LDAP.
49+
* **Oracle E-Business Suite AccessGate** - before issuing EBS access cookies, it validates authorization attributes with the OID service
50+
* **BIG-IP** - reverse-proxy and SAML service provider (SP) to the application.
51+
* Before header-based SSO to the Oracle application, authentication is delegated to the SAML IdP
4752

48-
**Oracle AccessGate:** Validates authorization attributes through back channel with OID service, before issuing EBS access cookies
53+
SHA supports SP- and IdP-initiated flows. The following diagram illustrates the SP-initiated flow.
4954

50-
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle application.
55+
![Diagram of secure hybrid access, based on the SP-initiated flow.](./media/f5-big-ip-oracle/sp-initiated-flow.png)
5156

52-
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
53-
54-
![Secure hybrid access - SP initiated flow](./media/f5-big-ip-oracle/sp-initiated-flow.png)
55-
56-
| Steps| Description |
57-
| -------- |-------|
58-
| 1| User connects to application endpoint (BIG-IP) |
59-
| 2| BIG-IP APM access policy redirects user to Azure AD (SAML IdP) |
60-
| 3| Azure AD pre-authenticates user and applies any enforced Conditional Access policies |
61-
| 4| User is redirected back to BIG-IP (SAML SP) and SSO is performed using issued SAML token |
62-
| 5| BIG-IP performs LDAP query for users Unique ID (UID) attribute |
63-
| 6| BIG-IP injects returned UID attribute as user_orclguid header in EBS session cookie request to Oracle AccessGate |
64-
| 7| Oracle AccessGate validates UID against Oracle Internet Directory (OID) service and issues EBS access cookie
65-
| 8| EBS user headers and cookie sent to application and returns the payload to the user |
57+
1. User connects to application endpoint (BIG-IP).
58+
2. BIG-IP APM access policy redirects user to Azure AD (SAML IdP).
59+
3. Azure AD preauthenticates user and applies Conditional Access policies.
60+
4. User is redirected to BIG-IP (SAML SP) and SSO occurs using the issued SAML token.
61+
5. BIG-IP performs an LDAP query for the user Unique ID (UID) attribute.
62+
6. BIG-IP injects returned UID attribute as user_orclguid header in EBS session cookie request to Oracle AccessGate.
63+
7. Oracle AccessGate validates UID against OID service and issues EBS access cookie.
64+
8. EBS user headers and cookie sent to application and returns the payload to the user.
6665

6766
## Prerequisites
6867

69-
Prior BIG-IP experience isn’t necessary, but you need:
70-
71-
* An Azure AD free subscription or above
72-
73-
* An existing BIG-IP or [deploy a BIG-IP Virtual Edition (VE) in Azure](./f5-bigip-deployment-guide.md)
74-
75-
* Any of the following F5 BIG-IP license SKUs
68+
You need the following components:
7669

70+
* An Azure subscription
71+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
72+
* For the account, have Azure AD Application Admin permissions
73+
* A BIG-IP or deploy a BIG-IP Virtual Edition (VE) in Azure
74+
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
75+
* Any of the following F5 BIG-IP license SKUs:
7776
* F5 BIG-IP® Best bundle
78-
7977
* F5 BIG-IP Access Policy Manager™ (APM) standalone license
80-
81-
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
82-
83-
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php).
84-
85-
* User identities [synchronized](../hybrid/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD or created directly within Azure AD and flowed back to your on-premises directory
86-
87-
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
88-
89-
* An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
90-
91-
* An existing Oracle EBS suite including Oracle AccessGate and an LDAP enabled OID (Oracle Internet Database)
78+
* F5 BIG-IP Access Policy Manager™ (APM) add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
79+
* 90-day BIG-IP full feature trial. See, [Free Trials](https://www.f5.com/trial/big-ip-trial.php).
80+
* User identities synchronized from an on-premises directory to Azure AD
81+
* [Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
82+
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
83+
* See, [SSL profile](./f5-bigip-deployment-guide.md#ssl-profile)
84+
* An Oracle EBS Suite, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
9285

9386
## BIG-IP configuration methods
9487

@@ -97,7 +90,7 @@ There are many methods to configure BIG-IP for this scenario, including two temp
9790
>[!NOTE]
9891
> All example strings or values referenced throughout this guide should be replaced with those for your actual environment.
9992
100-
## Register Easy Button
93+
## Register the Easy Button
10194

10295
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](../develop/quickstart-register-app.md)
10396

0 commit comments

Comments
 (0)