You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle EBS
17
17
18
-
Learn to secure Oracle Enterprise Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
18
+
Learn to secure Oracle E-Business Suite (EBS) using Azure Active Directory (Azure AD), with F5 BIG-IP Easy Button Guided Configuration. Integrating a BIG-IP with Azure AD has many benefits:
19
19
20
20
* Improved Zero Trust governance through Azure AD preauthentication and Conditional Access
21
21
* See, [What is Conditional Access?](../conditional-access/overview.md)
@@ -46,9 +46,9 @@ The secure hybrid access (SHA) solution has the following components:
46
46
* With SSO, Azure AD provides BIG-IP session attributes
47
47
***Oracle Internet Directory (OID)** - hosts the user database
48
48
* BIG-IP verifies authorization attributes with LDAP
49
-
***Oracle E-Business Suite AccessGate** - before issuing EBS access cookies, it validates authorization attributes with the OID service
49
+
***Oracle E-Business Suite AccessGate** - validates authorization attributes with the OID service, then issues EBS access cookies
50
50
***BIG-IP** - reverse-proxy and SAML service provider (SP) to the application
51
-
*Before header-based SSO to the Oracle application, authentication is delegated to the SAML IdP
51
+
*Authentication is delegated to the SAML IdP, then header-based SSO to the Oracle application occurs
52
52
53
53
SHA supports SP- and IdP-initiated flows. The following diagram illustrates the SP-initiated flow.
54
54
@@ -59,9 +59,9 @@ SHA supports SP- and IdP-initiated flows. The following diagram illustrates the
59
59
3. Azure AD preauthenticates user and applies Conditional Access policies.
60
60
4. User is redirected to BIG-IP (SAML SP) and SSO occurs using the issued SAML token.
61
61
5. BIG-IP performs an LDAP query for the user Unique ID (UID) attribute.
62
-
6. BIG-IP injects returned UID attribute as user_orclguid header in EBS session cookie request to Oracle AccessGate.
63
-
7. Oracle AccessGate validates UID against OID service and issues EBS access cookie.
64
-
8. EBS user headers and cookie sent to application and returns the payload to the user.
62
+
6. BIG-IP injects returned UID attribute as user_orclguid header in Oracle EBS session cookie request to Oracle AccessGate.
63
+
7. Oracle AccessGate validates UID against OID service and issues Oracle EBS access cookie.
64
+
8.Oracle EBS user headers and cookie sent to application and returns the payload to the user.
65
65
66
66
## Prerequisites
67
67
@@ -81,7 +81,7 @@ You need the following components:
81
81
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/how-to-connect-sync-whatis.md)
82
82
* An SSL certificate to publish services over HTTPS, or use default certificates while testing
83
83
* See, [SSL profile](./f5-bigip-deployment-guide.md#ssl-profile)
84
-
* An Oracle EBS Suite, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
84
+
* An Oracle EBS, Oracle AccessGate, and an LDAP-enabled Oracle Internet Database (OID)
85
85
86
86
## BIG-IP configuration method
87
87
@@ -185,7 +185,7 @@ Use Service Provider settings for the properties of the SAML SP instance of the
185
185
186
186
### Azure AD
187
187
188
-
Easy Button has application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. The following screenshot is the Oracle E-Business Suite option under Azure Configuration
188
+
Easy Button has application templates for Oracle PeopleSoft, Oracle E-Business Suite, Oracle JD Edwards, SAP ERP and a generic SHA template. The following screenshot is the Oracle E-Business Suite option under Azure Configuration.
189
189
190
190
1. Select **Oracle E-Business Suite**.
191
191
2. Select **Add**.
@@ -194,7 +194,7 @@ Easy Button has application templates for Oracle PeopleSoft, Oracle E-business S
194
194
195
195
#### Azure Configuration
196
196
197
-
1. Enter a **Display Name** for the app BIG-IP creates in your Azure AD tenant, and the icon on the MyApps portal.
197
+
1. Enter a **Display Name** for the app BIG-IP creates in your Azure AD tenant, and the icon on MyApps.
198
198
2. In **Sign On URL (optional)**, enter the EBS application public FQDN.
199
199
3. Enter the default path for the Oracle EBS homepage.
200
200
@@ -248,15 +248,16 @@ Conditional Access policies control access based on device, application, locatio
248
248
To select a policy for the application to be published:
249
249
250
250
1. In **Available Policies**, select a policy.
251
-
2. Select the **right arrow** and move it to **Selected Policies**.
251
+
2. Select the **right arrow**.
252
+
3. Move the policy to **Selected Policies**.
252
253
253
-
> [!NOTE]
254
-
> The **Include** or **Exclude** option is selected for some policies. If both options are checked, the policy is unenforced.
254
+
> [!NOTE]
255
+
> The **Include** or **Exclude** option is selected for some policies. If both options are checked, the policy is unenforced.
255
256
256
257

257
258
258
-
> [!NOTE]
259
-
> The policy list appears when you select the **Conditional Access Policy** tab. Use the **Refresh**button for the wizard to query your tenant. Refresh appears for deployed applications.
259
+
> [!NOTE]
260
+
> Select the **Conditional Access Policy** tab and the policy list appears. Select **Refresh**and the wizard queries your tenant. Refresh appears for deployed applications.
260
261
261
262
### Virtual Server Properties
262
263
@@ -289,7 +290,7 @@ The **Application Pool** tab has services behind a BIG-IP, a pool with one or mo
289
290
290
291
#### Single Sign-On & HTTP Headers
291
292
292
-
The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. The Oracle EBS application expects headers, enable HTTP headers.
293
+
The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. The Oracle EBS application expects headers, therefore enable HTTP headers.
293
294
294
295
1. On **Single Sign-On & HTTP Headers**, select **HTTP Headers**.
295
296
2. For **Header Operation**, select **replace**.
@@ -306,19 +307,19 @@ The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization h
306
307
307
308
### Session Management
308
309
309
-
Use BIG-IPs Session Management to define conditions for user session termination or continuation.
310
+
Use BIG-IP Session Management to define conditions for user session termination or continuation.
310
311
311
-
To learn more, got to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
312
+
To learn more, go to support.f5.com for [K18390492: Security | BIG-IP APM operations guide](https://support.f5.com/csp/article/K18390492)
312
313
313
-
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminate the session between the BIG-IP and a client.
314
+
Single Log-Out (SLO) functionality ensures sessions between the IdP, BIG-IP, and the user agent, terminate when users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it populates the Logout URL with the APM SLO endpoint. Thus, IdP-initiated sign out, from the My Apps portal, terminates the session between the BIG-IP and a client.
314
315
315
316
See, Microsoft [My Apps](https://myapplications.microsoft.com/)
316
317
317
318
The SAML federation metadata for the published application is imported from the tenant. This action provides the APM with the SAML sign out endpoint for Azure AD. Then, SP-initiated sign out terminates the client and Azure AD session. Ensure the APM knows when a user signs out.
318
319
319
320
If you use the BIG-IP webtop portal to access published applications, a sign-out is processed by the APM to call the Azure AD sign-out endpoint. If you don't use the BIG-IP webtop portal, the user can't instruct the APM to sign out. If the user signs out of the application, the BIG-IP is oblivious to the action. Ensure SP-initiated sign out triggers secure sessions terminatation. Add an SLO function to the applications **Sign out** button to redirect the client to the Azure AD SAML or BIG-IP sign-out endpoint. Find the SAML sign-out endpoint URL for your tenant in **App Registrations > Endpoints**.
320
321
321
-
If you can't change the app, have the BIG-IP listen for the application sign-out call and trigger SLO.
322
+
If you can't change the app, have the BIG-IP listen for the application sign-out call and then trigger SLO.
322
323
323
324
Learn more:
324
325
@@ -335,7 +336,7 @@ Learn more:
335
336
## Test
336
337
337
338
1. From a browser, connect to the Oracle EBS application external URL, or select the application icon in the [My Apps](https://myapps.microsoft.com/).
338
-
2. Authenticate to Azure AD
339
+
2. Authenticate to Azure AD.
339
340
3. You’re redirected to the BIG-IP virtual server for the application and signed in by SSO.
340
341
341
342
For increased security, block direct application access, thereby enforcing a path through the BIG-IP.
@@ -346,6 +347,8 @@ Sometimes, the Guided Configuration templates lack flexibility for requirements.
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Most configurations are automated by wizard templates.
350
353
351
354
1. Navigate to **Access > Guided Configuration**.
@@ -360,7 +363,7 @@ After you disable strict mode, you can't make changes with the wizard. However,
360
363
361
364
## Troubleshooting
362
365
363
-
Use the following instruction to help troubleshoot issues.
366
+
Use the following instructions to help troubleshoot issues.
364
367
365
368
### Increase log verbosity
366
369
@@ -372,7 +375,7 @@ Use BIG-IP logging to isolate issues with connectivity, SSO, policy violations,
372
375
4. Select **Edit > Access System Logs**.
373
376
5. From the SSO list, select **Debug**.
374
377
6. Select **OK**.
375
-
7. Reproduce this issue.
378
+
7. Reproduce the issue.
376
379
8. Inspect the logs.
377
380
378
381
Revert the settings changes because verbose mode generates excessive data.
@@ -412,4 +415,4 @@ Use the following bash shell command to validate the APM service account for LDA
412
415
Learn more:
413
416
414
417
* Go to support.f5.com for [K11072: Configuring LDAP remote authentication for AD](https://support.f5.com/csp/article/K11072)
415
-
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).
418
+
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html)
0 commit comments