Skip to content

Commit 887d933

Browse files
authored
Update f5-big-ip-oracle-enterprise-business-suite-easy-button.md
1 parent a1c14d2 commit 887d933

File tree

1 file changed

+26
-23
lines changed

1 file changed

+26
-23
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection: M365-identity-device-management
1515

1616
# Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle EBS
1717

18-
Learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
18+
Learn to secure Oracle E-Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
1919

2020
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
2121
* See, [What is Conditional Access?](../conditional-access/overview.md)
@@ -46,9 +46,9 @@ The secure hybrid access (SHA) solution has the following components:
4646
* With SSO, Azure AD provides BIG-IP session attributes
4747
* **Oracle Internet Directory (OID)** - hosts the user database
4848
* BIG-IP verifies authorization attributes with LDAP
49-
* **Oracle E-Business Suite AccessGate** - before issuing EBS access cookies, it validates authorization attributes with the OID service
49+
* **Oracle E-Business Suite AccessGate** - validates authorization attributes with the OID service, then issues EBS access cookies
5050
* **BIG-IP** - reverse-proxy and SAML service provider (SP) to the application
51-
* Before header-based SSO to the Oracle application, authentication is delegated to the SAML IdP
51+
* Authentication is delegated to the SAML IdP, then header-based SSO to the Oracle application occurs
5252

5353
SHA supports SP- and IdP-initiated flows. The following diagram illustrates the SP-initiated flow.
5454

@@ -59,9 +59,9 @@ SHA supports SP- and IdP-initiated flows. The following diagram illustrates the
5959
3. Azure AD preauthenticates user and applies Conditional Access policies.
6060
4. User is redirected to BIG-IP (SAML SP) and SSO occurs using the issued SAML token.
6161
5. BIG-IP performs an LDAP query for the user Unique ID (UID) attribute.
62-
6. BIG-IP injects returned UID attribute as user_orclguid header in EBS session cookie request to Oracle AccessGate.
63-
7. Oracle AccessGate validates UID against OID service and issues EBS access cookie.
64-
8. EBS user headers and cookie sent to application and returns the payload to the user.
62+
6. BIG-IP injects returned UID attribute as user_orclguid header in Oracle EBS session cookie request to Oracle AccessGate.
63+
7. Oracle AccessGate validates UID against OID service and issues Oracle EBS access cookie.
64+
8. Oracle EBS user headers and cookie sent to application and returns the payload to the user.
6565

6666
## Prerequisites
6767

@@ -81,7 +81,7 @@ You need the following components:
8181
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
8282
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
8383
* See, [SSL profile](./f5-bigip-deployment-guide.md#ssl-profile)
84-
* An Oracle EBS Suite, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
84+
* An Oracle EBS, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
8585

8686
## BIG-IP configuration method
8787

@@ -185,7 +185,7 @@ Use Service Provider settings for the properties of the SAML SP instance of the
185185

186186
### Azure AD
187187

188-
Easy Button has application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. The following screenshot is the Oracle E-Business Suite option under Azure Configuration
188+
Easy Button has application templates for Oracle PeopleSoft, Oracle E-Business Suite, Oracle JD Edwards, SAP ERP and a generic SHA template. The following screenshot is the Oracle E-Business Suite option under Azure Configuration.
189189

190190
1. Select **Oracle E-Business Suite**.
191191
2. Select **Add**.
@@ -194,7 +194,7 @@ Easy Button has application templates for Oracle PeopleSoft, Oracle E-business S
194194

195195
#### Azure Configuration
196196

197-
1. Enter a **Display Name** for the app BIG-IP creates in your Azure AD tenant, and the icon on the MyApps portal.
197+
1. Enter a **Display Name** for the app BIG-IP creates in your Azure AD tenant, and the icon on MyApps.
198198
2. In **Sign On URL (optional)**, enter the EBS application public FQDN.
199199
3. Enter the default path for the Oracle EBS homepage.
200200

@@ -248,15 +248,16 @@ Conditional Access policies control access based on device, application, locatio
248248
To select a policy for the application to be published:
249249

250250
1. In **Available Policies**, select a policy.
251-
2. Select the **right arrow** and move it to **Selected Policies**.
251+
2. Select the **right arrow**.
252+
3. Move the policy to **Selected Policies**.
252253

253-
> [!NOTE]
254-
> The **Include** or **Exclude** option is selected for some policies. If both options are checked, the policy is unenforced.
254+
> [!NOTE]
255+
> The **Include** or **Exclude** option is selected for some policies. If both options are checked, the policy is unenforced.
255256
256257
![Screenshot of the Exclude option selected for four polices.](./media/f5-big-ip-easy-button-ldap/conditional-access-policy.png)
257258

258-
> [!NOTE]
259-
> The policy list appears when you select the **Conditional Access Policy** tab. Use the **Refresh** button for the wizard to query your tenant. Refresh appears for deployed applications.
259+
> [!NOTE]
260+
> Select the **Conditional Access Policy** tab and the policy list appears. Select **Refresh** and the wizard queries your tenant. Refresh appears for deployed applications.
260261
261262
### Virtual Server Properties
262263

@@ -289,7 +290,7 @@ The **Application Pool** tab has services behind a BIG-IP, a pool with one or mo
289290

290291
#### Single Sign-On & HTTP Headers
291292

292-
The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. The Oracle EBS application expects headers, enable HTTP headers.
293+
The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. The Oracle EBS application expects headers, therefore enable HTTP headers.
293294

294295
1. On **Single Sign-On & HTTP Headers**, select **HTTP Headers**.
295296
2. For **Header Operation**, select **replace**.
@@ -306,19 +307,19 @@ The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization h
306307
307308
### Session Management
308309

309-
Use BIG-IPs Session Management to define conditions for user session termination or continuation.
310+
Use BIG-IP Session Management to define conditions for user session termination or continuation.
310311

311-
To learn more, got to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
312+
To learn more, go to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
312313

313-
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminate the session between the BIG-IP and a client.
314+
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminates the session between the BIG-IP and a client.
314315

315316
See, Microsoft [My Apps](https://myapplications.microsoft.com/)
316317

317318
The SAML federation metadata for the published application is imported from the tenant. This action provides the APM with the SAML sign out endpoint for Azure AD. Then, SP-initiated sign out terminates the client and Azure AD session. Ensure the APM knows when a user signs out.
318319

319320
If you use the BIG-IP webtop portal to access published applications, a sign-out is processed by the APM to call the Azure AD sign-out endpoint. If you don't use the BIG-IP webtop portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. Ensure SP-initiated sign out triggers secure sessions terminatation. Add an SLO function to the applications **Sign out** button to redirect the client to the Azure AD SAML or BIG-IP sign-out endpoint. Find the SAML sign-out endpoint URL for your tenant in **App Registrations > Endpoints**.
320321

321-
If you can't change the app, have the BIG-IP listen for the application sign-out call and trigger SLO.
322+
If you can't change the app, have the BIG-IP listen for the application sign-out call and then trigger SLO.
322323

323324
Learn more:
324325

@@ -335,7 +336,7 @@ Learn more:
335336
## Test
336337

337338
1. From a browser, connect to the Oracle EBS application external URL, or select the application icon in the [My Apps](https://myapps.microsoft.com/).
338-
2. Authenticate to Azure AD
339+
2. Authenticate to Azure AD.
339340
3. You’re redirected to the BIG-IP virtual server for the application and signed in by SSO.
340341

341342
For increased security, block direct application access, thereby enforcing a path through the BIG-IP.
@@ -346,6 +347,8 @@ Sometimes, the Guided Configuration templates lack flexibility for requirements.
346347

347348
Learn more: [Tutorial: Configure F5 BIG-IP’s Access Policy Manager for header-based SSO](./f5-big-ip-header-advanced.md).
348349

350+
### Manually change configurations
351+
349352
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Most configurations are automated by wizard templates.
350353

351354
1. Navigate to **Access > Guided Configuration**.
@@ -360,7 +363,7 @@ After you disable strict mode, you can't make changes with the wizard. However,
360363
361364
## Troubleshooting
362365

363-
Use the following instruction to help troubleshoot issues.
366+
Use the following instructions to help troubleshoot issues.
364367

365368
### Increase log verbosity
366369

@@ -372,7 +375,7 @@ Use BIG-IP logging to isolate issues with connectivity, SSO, policy violations,
372375
4. Select **Edit > Access System Logs**.
373376
5. From the SSO list, select **Debug**.
374377
6. Select **OK**.
375-
7. Reproduce this issue.
378+
7. Reproduce the issue.
376379
8. Inspect the logs.
377380

378381
Revert the settings changes because verbose mode generates excessive data.
@@ -412,4 +415,4 @@ Use the following bash shell command to validate the APM service account for LDA
412415
Learn more:
413416

414417
* Go to support.f5.com for [K11072: Configuring LDAP remote authentication for AD](https://support.f5.com/csp/article/K11072)
415-
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).
418+
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html)

0 commit comments

Comments
 (0)