You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The secure hybrid access solution for this scenario is made up of several compon
41
41
42
42
**Oracle JDE Application:** BIG-IP published service to be protected by Azure AD SHA.
43
43
44
-
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP.
44
+
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SAML based SSO to the BIG-IP. Through SSO, Azure AD provides the BIG-IP with any required session attributes.
45
45
46
46
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
47
47
@@ -80,7 +80,7 @@ Prior BIG-IP experience isn’t necessary, but you need:
80
80
81
81
* An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
82
82
83
-
* An [SSL web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs whilst testing
83
+
* An [SSL Web certificate](./f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS, or use default BIG-IP certs while testing
84
84
85
85
* An existing Oracle JDE environment
86
86
@@ -164,7 +164,7 @@ Some of these are global settings can be re-used for publishing more application
164
164
165
165
The **Service Provider** settings define the SAML SP properties for the APM instance representing the application protected through SHA.
166
166
167
-
1. Enter **Host**. This is the public FQDN of the application being secured. You need a corresponding DNS record for clients to resolve this address, but using a localhost record is fine during testing
167
+
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
168
168
169
169
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
170
170
@@ -220,7 +220,7 @@ This section defines all properties that you would normally use to manually conf
220
220
221
221
When a user successfully authenticates, Azure AD issues a SAML token with a default set of claims and attributes uniquely identifying the user. The **User Attributes & Claims** tab shows the default claims to issue for the new application. It also lets you configure more claims.
222
222
223
-

223
+

224
224
225
225
You can include additional Azure AD attributes if necessary, but the Oracle JDE scenario only requires the default attributes.
226
226
@@ -258,7 +258,7 @@ To select a policy to be applied to the application being published:
258
258
259
259
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for client requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
260
260
261
-
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP.
261
+
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
0 commit comments