You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-peoplesoft-easy-button.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Integrate BIG-IP with Azure AD for many benefits:
24
24
* See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
25
25
* See, [What is Conditional Access?](../conditional-access/overview.md)
26
26
* Single sign-on (SSO) between Azure AD and BIG-IP published services
27
-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
27
+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
28
28
29
29
Learn more:
30
30
@@ -75,8 +75,7 @@ For this scenario, SHA supports SP- and IdP-initiated flows. The following diagr
75
75
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
76
76
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
77
77
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
78
-
* An account with Azure AD Application Admin permissions
79
-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
78
+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
80
79
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
81
80
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
82
81
* A PeopleSoft environment
@@ -100,14 +99,13 @@ Learn more: [Quickstart: Register an application with the Microsoft identity pla
100
99
101
100
The following instructions help you create a tenant app registration to authorize Easy Button access to Graph. With these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
102
101
103
-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrative permissions.
104
-
2. From the left navigation pane, select the **Azure Active Directory** service.
105
-
3. Under **Manage**, select **App registrations > New registration**.
106
-
4. Enter an application **Name**.
107
-
5. For **Accounts in this organizational directory only**, specify who uses the application.
108
-
6. Select **Register**.
109
-
7. Navigate to **API permissions**.
110
-
8. Authorize the following Microsoft Graph **Application permissions**:
102
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
103
+
2. Browse to **Identity** > **Applications** > **App registrations > New registration**.
104
+
3. Enter an application **Name**.
105
+
4. For **Accounts in this organizational directory only**, specify who uses the application.
106
+
5. Select **Register**.
107
+
6. Navigate to **API permissions**.
108
+
7. Authorize the following Microsoft Graph **Application permissions**:
0 commit comments