Skip to content

Commit 7cd22bc

Browse files
Merge pull request #251096 from omondiatieno/oracle-easy-button
Oracle easy button - UI updates
2 parents 9ff4200 + 4195762 commit 7cd22bc

File tree

1 file changed

+9
-11
lines changed

1 file changed

+9
-11
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-peoplesoft-easy-button.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Integrate BIG-IP with Azure AD for many benefits:
2424
* See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
2525
* See, [What is Conditional Access?](../conditional-access/overview.md)
2626
* Single sign-on (SSO) between Azure AD and BIG-IP published services
27-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
27+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
2828

2929
Learn more:
3030

@@ -75,8 +75,7 @@ For this scenario, SHA supports SP- and IdP-initiated flows. The following diagr
7575
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
7676
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
7777
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
78-
* An account with Azure AD Application Admin permissions
79-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
78+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
8079
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
8180
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
8281
* A PeopleSoft environment
@@ -100,14 +99,13 @@ Learn more: [Quickstart: Register an application with the Microsoft identity pla
10099

101100
The following instructions help you create a tenant app registration to authorize Easy Button access to Graph. With these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
102101

103-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrative permissions.
104-
2. From the left navigation pane, select the **Azure Active Directory** service.
105-
3. Under **Manage**, select **App registrations > New registration**.
106-
4. Enter an application **Name**.
107-
5. For **Accounts in this organizational directory only**, specify who uses the application.
108-
6. Select **Register**.
109-
7. Navigate to **API permissions**.
110-
8. Authorize the following Microsoft Graph **Application permissions**:
102+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
103+
2. Browse to **Identity** > **Applications** > **App registrations > New registration**.
104+
3. Enter an application **Name**.
105+
4. For **Accounts in this organizational directory only**, specify who uses the application.
106+
5. Select **Register**.
107+
6. Navigate to **API permissions**.
108+
7. Authorize the following Microsoft Graph **Application permissions**:
111109

112110
* Application.ReadWrite.All
113111
* Application.ReadWrite.OwnedBy

0 commit comments

Comments
 (0)