You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+12-15Lines changed: 12 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Learn to configure F5 BIG-IP Access Policy Manager (APM) and Azure Active Direct
21
21
* See [Zero Trust security](../../security/fundamentals/zero-trust.md)
22
22
* Full SSO between Azure AD and BIG-IP published services
23
23
* Managed identities and access from one control plane
24
-
* See the [Azure portal](https://azure.microsoft.com/features/azure-portal)
24
+
* See the [Microsoft Entra admin center](https://entra.microsoft.com)
25
25
26
26
Learn more:
27
27
@@ -66,7 +66,7 @@ You need the following components:
66
66
67
67
* An Azure subscription
68
68
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
69
-
*For the account, have Azure AD Application Administrator permissions
69
+
*One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator
70
70
* A BIG-IP or deploy a BIG-IP Virtual Edition (VE) in Azure
71
71
* See [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
72
72
* Any of the following F5 BIG-IP license SKUs:
@@ -94,19 +94,16 @@ The configuration in this article is a flexible SHA implementation: manual creat
94
94
95
95
BIG-IP registration is the first step for SSO between entities. The app you create from the F5 BIG-IP gallery template is the relying party, representing the SAML SP for the BIG-IP published application.
96
96
97
-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrator permissions.
98
-
2. In the left pane, select the **Azure Active Directory** service.
99
-
3. In the left menu, select **Enterprise applications**.
100
-
4. The **All applications** pane opens.
101
-
5. The list of applications in your Azure AD tenant appears.
102
-
6. On the **Enterprise applications** pane, select **New application**.
103
-
7. The **Browse Azure AD Gallery** pane opens.
104
-
8. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
105
-
10. In the Azure gallery, search for **F5**.
106
-
11. Select **F5 BIG-IP APM Azure AD integration**.
107
-
12. Enter a **Name** the new application uses to recognize the application instance.
108
-
13. Select **Add**.
109
-
14. Select **Create**.
97
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
3. In the **All applications** pane, select **New application**.
100
+
4. The **Browse Azure AD Gallery** pane opens.
101
+
5. Tiles appear for cloud platforms, on-premises applications, and featured applications. **Featured applications** icons indicate support of federated SSO and provisioning.
102
+
6. In the Azure gallery, search for **F5**.
103
+
7. Select **F5 BIG-IP APM Azure AD integration**.
104
+
8. Enter a **Name** the new application uses to recognize the application instance.
0 commit comments