You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Learn to secure Oracle E-Business Suite (EBS) using Azure Active Directory (Azur
23
23
* See, [Zero Trust security](../../security/fundamentals/zero-trust.md)
24
24
* Full SSO between Azure AD and BIG-IP published services
25
25
* Managed identities and access from one control plane
26
-
* See, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
26
+
* See, the [Microsoft Entra admin center](https://entra.microsoft.com)
27
27
28
28
Learn more:
29
29
@@ -70,7 +70,7 @@ You need the following components:
70
70
71
71
* An Azure subscription
72
72
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
73
-
*For the account, have Azure AD Application Administrator permissions
73
+
*Global Administrator, Cloud Application Administrator, or Application Administrator.
74
74
* A BIG-IP or deploy a BIG-IP Virtual Edition (VE) in Azure
75
75
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
76
76
* Any of the following F5 BIG-IP license SKUs:
@@ -101,9 +101,8 @@ Learn more: [Quickstart: Register an application with the Microsoft identity pla
101
101
102
102
Create a tenant app registration to authorize the Easy Button access to Graph. The BIG-IP pushes configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
103
103
104
-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrative permissions.
105
-
2. In the left navigation pane, select the **Azure Active Directory** service.
106
-
3. Under **Manage**, select **App registrations > New registration**.
104
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
0 commit comments