You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md
+53-22Lines changed: 53 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -334,51 +334,82 @@ Learn more:
334
334
335
335
## Test
336
336
337
-
From a browser, connect to the **Oracle EBS application’s external URL** or select the application’s icon in the [Microsoft MyApps portal](https://myapps.microsoft.com/). After authenticating to Azure AD, you’ll be redirected to the BIG-IP virtual server for the application and automatically signed in through SSO.
337
+
1. From a browser, connect to the Oracle EBS application external URL, or select the application icon in the [My Apps](https://myapps.microsoft.com/).
338
+
2. Authenticate to Azure AD
339
+
3. You’re redirected to the BIG-IP virtual server for the application and signed in by SSO.
338
340
339
-
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
341
+
For increased security, block direct application access, thereby enforcing a path through the BIG-IP.
340
342
341
343
## Advanced deployment
342
344
343
-
There may be cases where the Guided Configuration templates lack the flexibility to achieve more specific requirements. For those scenarios, see [Advanced Configuration for headers-based SSO](./f5-big-ip-header-advanced.md). Alternatively, the BIG-IP gives the option to disable **Guided Configuration’s strict management mode**. This allows you to manually tweak your configurations, even though bulk of your configurations are automated through the wizard-based templates.
345
+
Sometimes, the Guided Configuration templates lack flexibility for requirements.
344
346
345
-
You can navigate to **Access > Guided Configuration** and select the **small padlock icon** on the far right of the row for your applications’ configs.

349
+
Alternatively, in BIG-IP disable the Guided Configuration strict management mode to manually change configurations. Most configurations are automated by wizard templates.
348
350
349
-
At that point, changes via the wizard UI are no longer possible, but all BIG-IP objects associated with the published instance of the application will be unlocked for direct management.
351
+
1. Navigate to **Access > Guided Configuration**.
352
+
2. On the right end of the row for your application configuration, select the **padlock** icon.
350
353
351
-
> [!NOTE]
352
-
> Re-enabling strict mode and deploying a configuration will overwrite any settings performed outside of the Guided Configuration UI, therefore we recommend the advanced configuration method for production services.
354
+

355
+
356
+
After you disable strict mode, you can't make changes with the wizard. However, BIG-IP objects associated with the published app instance are unlocked for management.
357
+
358
+
> [!NOTE]
359
+
> If you re-enable strict mode, new configurations overwrite settings performed without the Guided Configuration. We recommend the advanced configuration method for production services.
353
360
354
361
## Troubleshooting
355
362
356
-
Failure to access a SHA protected application can be due to any number of factors. BIG-IP logging can help quickly isolate all sorts of issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Start troubleshooting by increasing the log verbosity level.
363
+
Use the following instruction to help troubleshoot issues.
Use BIG-IP logging to isolate issues with connectivity, SSO, policy violations, or misconfigured variable mappings. Increase the log verbosity level.
359
368
360
-
2. Select the row for your published application then **Edit > Access System Logs**
369
+
1. Navigate to **Access Policy > Overview > Event Logs**.
370
+
2. Select **Settings**.
371
+
3. Select the row for your published application.
372
+
4. Select **Edit > Access System Logs**.
373
+
5. From the SSO list, select **Debug**.
374
+
6. Select **OK**.
375
+
7. Reproduce this issue.
376
+
8. Inspect the logs.
361
377
362
-
3. Select **Debug** from the SSO list then **OK**
378
+
Revert the settings changes because verbose mode generates excessive data.
363
379
364
-
Reproduce your issue, then inspect the logs, but remember to switch this back when finished as verbose mode generates lots of data.
380
+
### BIG-IP error message
365
381
366
-
If you see a BIG-IP branded error immediately after successful Azure AD pre-authentication, it’s possible the issue relates to SSO from Azure AD to the BIG-IP.
382
+
If a BIG-IP error appears after Azure AD preauthentication, the issue might relate to Azure AD and BIG-IP SSO.
367
383
368
-
1. Navigate to **Access > Overview > Access reports**
384
+
1. Navigate to **Access > Overview.
385
+
2. Select **Access reports**.
386
+
3. Run the report for the last hour.
387
+
4. Review the logs for clues.
369
388
370
-
2. Run the report for the last hour to see if the logs provide any clues. The **View session**variables link for your session will also help understand if the APM is receiving the expected claims from Azure AD
389
+
Use the **View session** link for your session to confirm the APM receives expected Azure AD claims.
371
390
372
-
If you don’t see a BIG-IP error page, then the issue is probably more related to the backend request or SSO from the BIG-IP to the application.
391
+
### No BIG-IP error message
373
392
374
-
1. In which case head to **Access Policy > Overview > Active Sessions** and select the link for your active session
393
+
If no BIG-IP error page appears, the issue might relate to the back-end request, or BIG-IP and application SSO.
375
394
376
-
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
395
+
1. Navigate to **Access Policy > Overview.
396
+
2. Select **Active Sessions**.
397
+
3. Select the link for your active session.
377
398
378
-
See [BIG-IP APM variable assign examples](https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference](https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.
399
+
Use the **View Variables** link to investigate SSO issues, particularly if the BIG-IP APM doesn't obtain correct attributes from Azure AD, or another source.
400
+
401
+
Learn more:
379
402
380
-
The following command from a bash shell validates the APM service account used for LDAP queries and can successfully authenticate and query a user object:
403
+
* Go to devcentral.f5.com for [APM variable assign examples](https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107)
404
+
* Go to techdocs.f5.com for [Manual Chapter: Session Variables](https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html)
405
+
406
+
### Validate the APM service account
407
+
408
+
Use the following bash shell command to validate the APM service account for LDAP queries. The command authenticates and queries user objects.
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this [F5 knowledge article on LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).
412
+
Learn more:
413
+
414
+
* Go to support.f5.com for [K11072: Configuring LDAP remote authentication for AD](https://support.f5.com/csp/article/K11072)
415
+
* Go to techdocs.f5.com for [Manual Chapter: LDAP Query](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-authentication-methods/ldap-query.html).
0 commit comments