Skip to content

Commit a7f728f

Browse files
authored
Consistency updates
1 parent 5e42cd1 commit a7f728f

File tree

1 file changed

+17
-14
lines changed

1 file changed

+17
-14
lines changed

articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -93,9 +93,9 @@ There are many methods to configure BIG-IP for this scenario, including two temp
9393
9494
## Register Easy Button
9595

96-
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform](../develop/quickstart-register-app.md).
96+
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](/azure/active-directory/develop/quickstart-register-app)
9797

98-
A BIG-IP must also be registered as a client in Azure AD, before it is allowed to establish a trust in between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
98+
This first step creates a tenant app registration that will be used to authorize the **Easy Button** access to Graph. Through these permissions, the BIG-IP will be allowed to push the configurations required to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
9999

100100
1. Sign in to the [Azure AD portal](https://portal.azure.com/) with Application Administrative rights
101101

@@ -109,7 +109,7 @@ A BIG-IP must also be registered as a client in Azure AD, before it is allowed t
109109

110110
6. Select **Register** to complete the initial app registration
111111

112-
7. Navigate to **API permissions** and authorize the following Microsoft Graph permissions:
112+
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
113113

114114
* Application.Read.All
115115
* Application.ReadWrite.All
@@ -130,7 +130,7 @@ A BIG-IP must also be registered as a client in Azure AD, before it is allowed t
130130

131131
## Configure Easy Button
132132

133-
Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP) and Azure AD as an Identity Provider (IdP) for your application.
133+
Initiate the APM's **Guided Configuration** to launch the **Easy Button** Template.
134134

135135
1. Navigate to **Access > Guided Configuration > Microsoft Integration** and select **Azure AD Application**.
136136

@@ -146,7 +146,7 @@ Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP
146146

147147
### Configuration Properties
148148

149-
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
149+
The **Configuration Properties** tab creates a BIG-IP application config and SSO object. Consider the **Azure Service Account Details** section to represent the client you registered in your Azure AD tenant earlier, as an application. These settings allow a BIG-IP's OAuth client to individually register a SAML SP directly in your tenant, along with the SSO properties you would normally configure manually. Easy Button does this for every BIG-IP service being published and enabled for SHA.
150150

151151
Some of these are global settings can be re-used for publishing more applications, further reducing deployment time and effort.
152152

@@ -162,9 +162,9 @@ Some of these are global settings can be re-used for publishing more application
162162

163163
### Service Provider
164164

165-
The **Service Provider** settings define the SAML SP properties for the APM instance representing the application protected through SHA.
165+
The Service Provider settings define the properties for the SAML SP instance of the application protected through SHA.
166166

167-
1. Enter **Host**. This is usually the FQDN that will be used for the applications external URL
167+
1. Enter **Host**. This is the public FQDN of the application being secured
168168

169169
2. Enter **Entity ID**. This is the identifier Azure AD will use to identify the SAML SP requesting a token
170170

@@ -192,7 +192,7 @@ The **Service Provider** settings define the SAML SP properties for the APM inst
192192

193193
### Azure Active Directory
194194

195-
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant. The Easy Button wizard provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. In this example, select **JD Edwards Protected by F5 BIG-IP > Add**. This adds the template for the Oracle JD Edwards.
195+
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant. Easy Button provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. For this scenario select **JD Edwards Protected by F5 BIG-IP > Add**.
196196

197197
![ Screenshot for Azure configuration add BIG-IP application](./media/f5-big-ip-easy-button-oracle-jde/azure-configuration-add-big-ip-application.png)
198198

@@ -212,7 +212,7 @@ This section defines all properties that you would normally use to manually conf
212212

213213
![Screenshot for Azure configuration - Add signing certificates info](./media/f5-big-ip-easy-button-ldap/azure-configuration-sign-certificates.png)
214214

215-
6. **User and User Groups** are used to authorize access to the application. They are dynamically added from the tenant. **Add** a user or group that you can use later for testing, otherwise all access will be denied
215+
6. **User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. Add a user or group that you can use later for testing, otherwise all access will be denied
216216

217217
![Screenshot for Azure configuration - Add users and groups](./media/f5-big-ip-easy-button-ldap/azure-configuration-add-user-groups.png)
218218

@@ -264,7 +264,7 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
264264

265265
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
266266

267-
4. Select **Client SSL Profile** to enable the virtual server for HTTPS so that client connections are encrypted over TLS. Select the client SSL profile you created as part of the prerequisites or leave the default if testing
267+
4. The Client SSL Profile enables the virtual server for HTTPS, so that client connections are encrypted over TLS. Select the **Client SSL Profile** you created as part of the prerequisites or leave the default whilst testing
268268

269269
![Screenshot for Virtual server](./media/f5-big-ip-easy-button-ldap/virtual-server.png)
270270

@@ -291,15 +291,18 @@ The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorizati
291291
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-easy-button-oracle-jde/sso-and-http-headers.png)
292292

293293
>[!NOTE]
294-
>APM session variables defined within curly brackets are CASE sensitive. If you enter OrclGUID when the Azure AD attribute name is being defined as orclguid, it will cause an attribute mapping failure.
294+
>APM session variables defined within curly brackets are CASE sensitive. For example, if you enter OrclGUID when the Azure AD attribute name is being defined as orclguid, it will cause an attribute mapping failure
295295
296296
### Session Management
297+
The BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and corresponding user info. Refer to [F5's docs](https://support.f5.com/csp/article/K18390492) for details on these settings.
297298

298-
The BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and corresponding user info. Consult [F5 documentation](https://support.f5.com/csp/article/K18390492) for details on these settings.
299+
What isn’t covered here however is Single Log-Out (SLO) functionality, which ensures all sessions between the IdP, the BIG-IP, and the user agent are terminated as users sign off. When the Easy Button instantiates a SAML application in your Azure AD tenant, it also populates the Logout Url with the APM’s SLO endpoint. That way IdP initiated sign-outs from the Azure AD MyApps portal also terminate the session between the BIG-IP and a client.
299300

300-
What isn’t covered however is Single Log-Out (SLO) functionality, which ensures all sessions between the IdP, the BIG-IP, and the user agent are terminated as users sign off. When the Easy Button deploys a SAML application to your Azure AD tenant, it also populates the Logout Url with the APM’s SLO endpoint. That way IdP initiated sign-outs from the Azure AD MyApps portal also terminate the session between the BIG-IP and a client.
301+
Along with this the SAML federation metadata for the published application is also imported from your tenant, providing the APM with the SAML logout endpoint for Azure AD. This ensures SP initiated sign outs terminate the session between a client and Azure AD. But for this to be truly effective, the APM needs to know exactly when a user signs-out of the application.
301302

302-
During deployment, the SAML federation metadata for the published application is imported from your tenant, providing the APM the SAML logout endpoint for Azure AD. This helps SP initiated sign outs terminate the session between a client and Azure AD.
303+
If the BIG-IP webtop portal is used to access published applications then a sign-out from there would be processed by the APM to also call the Azure AD sign-out endpoint. But consider a scenario where the BIG-IP webtop portal isn’t used, then the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this. So for this reason, SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required. One way of achieving this would be to add an SLO function to your applications sign out button, so that it can redirect your client to either the Azure AD SAML or BIG-IP sign-out endpoint. The URL for SAML sign-out endpoint for your tenant can be found in **App Registrations > Endpoints**.
304+
305+
If making a change to the app is a no go, then consider having the BIG-IP listen for the application's sign-out call, and upon detecting the request have it trigger SLO. Refer to our [Oracle PeopleSoft SLO guidance](/azure/active-directory/manage-apps/f5-big-ip-oracle-peoplesoft-easy-button.md#peoplesoft-single-logout) for using BIG-IP irules to achieve this. More details on using BIG-IP iRules to achieve this is available in the F5 knowledge article [Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145) and [Overview of the Logout URI Include option](https://support.f5.com/csp/article/K12056).
303306

304307
## Summary
305308

0 commit comments

Comments
 (0)