Skip to content

Commit a1c14d2

Browse files
authored
Update f5-big-ip-oracle-enterprise-business-suite-easy-button.md
1 parent 9e122c3 commit a1c14d2

File tree

1 file changed

+53
-22
lines changed

1 file changed

+53
-22
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md

Lines changed: 53 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -334,51 +334,82 @@ Learn more:
334334

335335
## Test
336336

337-
From a browser, connect to the **Oracle EBS application’s external URL** or select the application’s icon in the [Microsoft MyApps portal](https://myapps.microsoft.com/). After authenticating to Azure AD, you’ll be redirected to the BIG-IP virtual server for the application and automatically signed in through SSO.
337+
1. From a browser, connect to the Oracle EBS application external URL, or select the application icon in the [My Apps](https://myapps.microsoft.com/).
338+
2. Authenticate to Azure AD
339+
3. You’re redirected to the BIG-IP virtual server for the application and signed in by SSO.
338340

339-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
341+
For increased security, block direct application access, thereby enforcing a path through the BIG-IP.
340342

341343
## Advanced deployment
342344

343-
There may be cases where the Guided Configuration templates lack the flexibility to achieve more specific requirements. For those scenarios, see [Advanced Configuration for headers-based SSO](./f5-big-ip-header-advanced.md). Alternatively, the BIG-IP gives the option to disable **Guided Configuration’s strict management mode**. This allows you to manually tweak your configurations, even though bulk of your configurations are automated through the wizard-based templates.
345+
Sometimes, the Guided Configuration templates lack flexibility for requirements.
344346

345-
You can navigate to **Access > Guided Configuration** and select the **small padlock icon** on the far right of the row for your applications’ configs.
347+
Learn more: [Tutorial: Configure F5 BIG-IP’s Access Policy Manager for header-based SSO](./f5-big-ip-header-advanced.md).
346348

347-
![Screenshot for Configure Easy Button - Strict Management](./media/f5-big-ip-oracle/strict-mode-padlock.png)
349+
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Most configurations are automated by wizard templates.
348350

349-
At that point, changes via the wizard UI are no longer possible, but all BIG-IP objects associated with the published instance of the application will be unlocked for direct management.
351+
1. Navigate to **Access > Guided Configuration**.
352+
2. On the right end of the row for your application configuration, select the **padlock** icon.
350353

351-
> [!NOTE]
352-
> Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, therefore we recommend the advanced configuration method for production services.
354+
![Screenshot of the padlock icon](./media/f5-big-ip-oracle/strict-mode-padlock.png)
355+
356+
After you disable strict mode, you can't make changes with the wizard. However, BIG-IP objects associated with the published app instance are unlocked for management.
357+
358+
> [!NOTE]
359+
> If you re-enable strict mode, new configurations overwrite settings performed without the Guided Configuration. We recommend the advanced configuration method for production services.
353360
354361
## Troubleshooting
355362

356-
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
363+
Use the following instruction to help troubleshoot issues.
364+
365+
### Increase log verbosity
357366

358-
1. Navigate to **Access Policy > Overview > Event Logs > Settings**
367+
Use BIG-IP logging to isolate issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Increase the log verbosity level.
359368

360-
2. Select the row for your published application then **Edit > Access System Logs**
369+
1. Navigate to **Access Policy > Overview > Event Logs**.
370+
2. Select **Settings**.
371+
3. Select the row for your published application.
372+
4. Select **Edit > Access System Logs**.
373+
5. From the SSO list, select **Debug**.
374+
6. Select **OK**.
375+
7. Reproduce this issue.
376+
8. Inspect the logs.
361377

362-
3. Select **Debug** from the SSO list then **OK**
378+
Revert the settings changes because verbose mode generates excessive data.
363379

364-
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
380+
### BIG-IP error message
365381

366-
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
382+
If a BIG-IP error appears after Azure AD preauthentication, the issue might relate to Azure AD and BIG-IP SSO.
367383

368-
1. Navigate to **Access > Overview > Access reports**
384+
1. Navigate to **Access > Overview.
385+
2. Select **Access reports**.
386+
3. Run the report for the last hour.
387+
4. Review the logs for clues.
369388

370-
2. Run the report for the last hour to see if the logs provide any clues. The **View session** variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
389+
Use the **View session** link for your session to confirm the APM receives expected Azure AD claims.
371390

372-
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
391+
### No BIG-IP error message
373392

374-
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
393+
If no BIG-IP error page appears, the issue might relate to the back-end request, or BIG-IP and application SSO.
375394

376-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
395+
1. Navigate to **Access Policy > Overview.
396+
2. Select **Active Sessions**.
397+
3. Select the link for your active session.
377398

378-
See [BIG-IP APM variable assign examples](https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference](https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.
399+
Use the **View Variables** link to investigate SSO issues, particularly if the BIG-IP APM doesn't obtain correct attributes from Azure AD, or another source.
400+
401+
Learn more:
379402

380-
The following command from a bash shell validates the APM service account used for LDAP queries and can successfully authenticate and query a user object:
403+
* Go to devcentral.f5.com for [APM variable assign examples](https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107)
404+
* Go to techdocs.f5.com for [Manual Chapter: Session Variables](https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html)
405+
406+
### Validate the APM service account
407+
408+
Use the following bash shell command to validate the APM service account for LDAP queries. The command authenticates and queries user objects.
381409

382410
```ldapsearch -xLLL -H 'ldap://192.168.0.58' -b "CN=oraclef5,dc=contoso,dc=lds" -s sub -D "CN=f5-apm,CN=partners,DC=contoso,DC=lds" -w 'P@55w0rd!' "(cn=testuser)" ```
383411

384-
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this [F5 knowledge article on LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).
412+
Learn more:
413+
414+
* Go to support.f5.com for [K11072: Configuring LDAP remote authentication for AD](https://support.f5.com/csp/article/K11072)
415+
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).

0 commit comments

Comments
 (0)