Skip to content

Commit 86f19c7

Browse files
Merge pull request #251103 from omondiatieno/oracle-jde-easy
oracle jde easy - UI updates
2 parents 0d5ef1b + 41ecedd commit 86f19c7

File tree

1 file changed

+9
-11
lines changed

1 file changed

+9
-11
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Integrate BIG-IP with Azure AD for many benefits:
2424
* See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
2525
* See, [What is Conditional Access?](../conditional-access/overview.md)
2626
* Single sign-on (SSO) between Azure AD and BIG-IP published services
27-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
27+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
2828

2929
Learn more:
3030

@@ -73,8 +73,7 @@ In this tutorial SHA supports SP- and IdP-initiated flows. The following diagram
7373
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
7474
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
7575
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
76-
* An account with Azure AD Application Admin permissions
77-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
76+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator
7877
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
7978
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
8079
* An Oracle JDE environment
@@ -96,14 +95,13 @@ Learn more: [Quickstart: Register an application with the Microsoft identity pla
9695

9796
The following instructions help you create a tenant app registration to authorize Easy Button access to Graph. With these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
9897

99-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrative permissions.
100-
2. From the left navigation pane, select the **Azure Active Directory** service.
101-
3. Under **Manage**, select **App registrations > New registration**.
102-
4. Enter an application **Name**.
103-
5. For **Accounts in this organizational directory only**, specify who uses the application.
104-
6. Select **Register**.
105-
7. Navigate to **API permissions**.
106-
8. Authorize the following Microsoft Graph **Application permissions**:
98+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
99+
2. Browse to **Identity** > **Applications** > **App registrations** > **New registration**.
100+
3. Enter an application **Name**.
101+
4. For **Accounts in this organizational directory only**, specify who uses the application.
102+
5. Select **Register**.
103+
6. Navigate to **API permissions**.
104+
7. Authorize the following Microsoft Graph **Application permissions**:
107105

108106
* Application.ReadWrite.All
109107
* Application.ReadWrite.OwnedBy

0 commit comments

Comments
 (0)