Skip to content

Commit 97d7506

Browse files
Merge pull request #251072 from omondiatieno/forms-advanced
F5 forms advance - UI updates
2 parents c2b7a25 + b4947fd commit 97d7506

File tree

1 file changed

+12
-15
lines changed

1 file changed

+12
-15
lines changed

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Learn to configure F5 BIG-IP Access Policy Manager (APM) and Azure Active Direct
2121
* See [Zero Trust security](../../security/fundamentals/zero-trust.md)
2222
* Full SSO between Azure AD and BIG-IP published services
2323
* Managed identities and access from one control plane
24-
* See the [Azure portal](https://azure.microsoft.com/features/azure-portal)
24+
* See the [Microsoft Entra admin center](https://entra.microsoft.com)
2525

2626
Learn more:
2727

@@ -66,7 +66,7 @@ You need the following components:
6666

6767
* An Azure subscription
6868
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
69-
* For the account, have Azure AD Application Administrator permissions
69+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator
7070
* A BIG-IP or deploy a BIG-IP Virtual Edition (VE) in Azure
7171
* See [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
7272
* Any of the following F5 BIG-IP license SKUs:
@@ -94,19 +94,16 @@ The configuration in this article is a flexible SHA implementation: manual creat
9494

9595
BIG-IP registration is the first step for SSO between entities. The app you create from the F5 BIG-IP gallery template is the relying party, representing the SAML SP for the BIG-IP published application.
9696

97-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
98-
2. In the left pane, select the **Azure Active Directory** service.
99-
3. In the left menu, select **Enterprise applications**.
100-
4. The **All applications** pane opens.
101-
5. The list of applications in your Azure AD tenant appears.
102-
6. On the **Enterprise applications** pane, select **New application**.
103-
7. The **Browse Azure AD Gallery** pane opens.
104-
8. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
105-
10. In the Azure gallery, search for **F5**.
106-
11. Select **F5 BIG-IP APM Azure AD integration**.
107-
12. Enter a **Name** the new application uses to recognize the application instance.
108-
13. Select **Add**.
109-
14. Select **Create**.
97+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
98+
2. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
99+
3. In the **All applications** pane, select **New application**.
100+
4. The **Browse Azure AD Gallery** pane opens.
101+
5. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
102+
6. In the Azure gallery, search for **F5**.
103+
7. Select **F5 BIG-IP APM Azure AD integration**.
104+
8. Enter a **Name** the new application uses to recognize the application instance.
105+
9. Select **Add**.
106+
10. Select **Create**.
110107

111108
### Enable SSO to F5 BIG-IP
112109

0 commit comments

Comments
 (0)