You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-enterprise-business-suite-easy-button.md
+64-74Lines changed: 64 additions & 74 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -185,130 +185,120 @@ Use Service Provider settings for the properties of the SAML SP instance of the
185
185
186
186
### Azure AD
187
187
188
-
This section defines all properties that you would normally use to manually configure a new BIG-IP SAML application within your Azure AD tenant. Easy Button provides a set of pre-defined application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. For this scenario select **Oracle E-Business Suite > Add**.
188
+
Easy Button has application templates for Oracle PeopleSoft, Oracle E-business Suite, Oracle JD Edwards, SAP ERP as well as generic SHA template for any other apps. The following screenshot is the Oracle E-Business Suite option under Azure Configuration
189
189
190
-

190
+
1. Select **Oracle E-Business Suite**.
191
+
2. Select **Add**.
191
192
192
-
#### Azure Configuration
193
+

193
194
194
-
1. Enter **Display Name** of app that the BIG-IP creates in your Azure AD tenant, and the icon that the users see on [MyApps portal](https://myapplications.microsoft.com/)
195
+
#### Azure Configuration
195
196
196
-
2. In the **Sign On URL (optional)** enter the public FQDN of the EBS application being secured, along with the default path for the Oracle EBS homepage
197
+
1. Enter a **Display Name** for the app BIG-IP creates in your Azure AD tenant, and the icon on the MyApps portal.
198
+
2. In **Sign On URL (optional)**, enter the EBS application public FQDN.
199
+
3. Enter the default path for the Oracle EBS homepage.
197
200
198
201

199
202
200
-
3. Select the refresh icon next to the **Signing Key** and **Signing Certificate** to locate the certificate you imported earlier
201
-
202
-
4. Enter the certificate’s password in **Signing Key Passphrase**
203
+
3. Next to the **Signing Key** and **Signing Certificate**, select the **refresh** icon.
204
+
4. Locate the certificate you imported.
205
+
5. In **Signing Key Passphrase**, enter the certificate password.
206
+
6. (Optional) Enable **Signing Option**. This ensures BIG-IP accepts tokens and claims signed by Azure AD.
203
207
204
-
5. Enable **Signing Option** (optional). This ensures that BIG-IP only accepts tokens and claims that are signed by Azure AD
208
+

205
209
206
-

210
+
7. For **User And User Groups**, add a user or group for testing, otherwise all access is denied. Users and user groups are dynamically queried from the Azure AD tenant and authorize access to the application.
207
211
208
-
6.**User and User Groups** are dynamically queried from your Azure AD tenant and used to authorize access to the application. Add a user or group that you can use later for testing, otherwise all access will be denied
209
-
210
-

212
+

211
213
212
214
#### User Attributes & Claims
213
215
214
-
When a user successfully authenticates, Azure AD issues a SAML token with a default set of claims and attributes uniquely identifying the user. The **User Attributes & Claims** tab shows the default claims to issue for the new application. It also lets you configure more claims.
215
-
216
-

216
+
When a user authenticates, Azure AD issues a SAML token with default claims and attributes identifying the user. The **User Attributes & Claims** tab has default claims to issue for the new application. Use this area to configure more claims. If needed, add Azure AD attributes, however the Oracle EBS scenario requires the default attributes.
217
217
218
-
You can include additional Azure AD attributes if necessary, but the Oracle EBS scenario only requires the default attributes.
218
+

219
219
220
220
#### Additional User Attributes
221
221
222
-
The **Additional User Attributes** tab can support a variety of distributed systems requiring attributes stored in other directories for session augmentation. Attributes fetched from an LDAP source can then be injected as additional SSO headers to further control access based on roles, Partner IDs, etc.
223
-
224
-
1. Enable the **Advanced Settings** option
225
-
226
-
2. Check the **LDAP Attributes** check box
227
-
228
-
3. Select **Create New** in **Choose Authentication Server**
229
-
230
-
4. Select **Use pool** or **Direct** server connection mode depending on your setup. This provides the **Server Address** of the target LDAP service. If using a single LDAP server, select **Direct**.
231
-
232
-
5. Enter **Service Port** as 3060 (Default), 3161 (Secure), or any other port your Oracle LDAP service operates on
233
-
234
-
6. Enter the **Base Search DN** (distinguished name) from which to search. This search DN is used to search groups across a whole directory.
222
+
The **Additional User Attributes** tab supports distributed systems that require attributes stored in directories for session augmentation. Attributes fetched from an LDAP source are injected as more SSO headers to control access based on roles, partner ID, etc.
235
223
236
-
7. Set the **Admin DN** to the exact distinguished name for the account the APM will use to authenticate for LDAP queries, along with its password
224
+
1. Enable the **Advanced Settings** option.
225
+
2. Check the **LDAP Attributes** check box.
226
+
3. In **Choose Authentication Server**, select **Create New**.
227
+
4. Depending on your setup, select **Use pool** or **Direct** server connection mode. This provides the target LDAP service server address. For a single LDAP server, select **Direct**.
228
+
5. For **Service Port**, enter **3060** (Default), **3161** (Secure), or another port for the Oracle LDAP service.
229
+
6. Enter a **Base Search DN**. Use the distinguished name (DN) to search for groups in a directory.
230
+
7. For **Admin DN** enter the account distinguished name APM uses to authenticate LDAP queries.
231
+
8. For **Admin Password**, enter the password.
237
232
238
-

233
+

239
234
240
-
8. Leave all default **LDAP Schema Attributes**
235
+
9. Leave the default **LDAP Schema Attributes**.
241
236
242
237

243
238
244
-
9. Under **LDAP Query Properties**, set the **Search Dn** to the base node of the LDAP server from which to search for user objects
239
+
10. Under **LDAP Query Properties**, for **Search Dn** enter the LDAP server base node for user object search.
240
+
11. For **Required Attributes**, enter the user object attribute name to be returned from the LDAP directory. For EBS, the default is **orclguid**.
245
241
246
-
10. Add the name of the user object attribute that must be returned from the LDAP directory. For EBS, the default is **orclguid**
247
-
248
-

242
+

249
243
250
244
#### Conditional Access Policy
251
245
252
-
Conditional Access policies are enforced post Azure AD pre-authentication, to control access based on device, application, location, and risk signals.
253
-
254
-
The **Available Policies** view, by default, will list all Conditional Access policies that do not include user-based actions.
255
-
256
-
The **Selected Policies** view, by default, displays all policies targeting All cloud apps. These policies cannot be deselected or moved to the Available Policies list as they are enforced at a tenant level.
246
+
Conditional Access policies control access based on device, application, location, and risk signals. Policies are enforced after Azure AD preauthentication. The Available Policies view has Conditional Access policies with no user actions. The Selected Policies view has policies for cloud apps. You can't deselect these policies or move them to Available Policies because they're enforced at the tenant level.
257
247
258
-
To select a policy to be applied to the application being published:
248
+
To select a policy for the application to be published:
259
249
260
-
1. Select the desired policy in the **Available Policies** list
250
+
1. In **Available Policies**, select a policy.
251
+
2. Select the **right arrow** and move it to **Selected Policies**.
261
252
262
-
2. Select the right arrow and move it to the **Selected Policies** list
263
-
264
-
The selected policies should either have an **Include** or **Exclude** option checked. If both options are checked, the policy is not enforced.
253
+
> [!NOTE]
254
+
> The **Include** or **Exclude** option is selected for some policies. If both options are checked, the policy is unenforced.
265
255
266
-

256
+

267
257
268
258
> [!NOTE]
269
-
> The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
259
+
> The policy list appears when you select the **Conditional Access Policy**tab. Use the **Refresh**button for the wizard to query your tenant. Refresh appears for deployed applications.
270
260
271
261
### Virtual Server Properties
272
262
273
-
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for client requests to the application. Any received traffic is processed and evaluated against the APM profile associated with the virtual server, before being directed according to the policy results and settings.
263
+
A virtual server is a BIG-IP data plane object represented by a virtual IP address listening for application client requests. Received traffic is processed and evaluated against the APM profile associated with the virtual server. Then, traffic is directed according to policy.
274
264
275
-
1. Enter **Destination Address**. This is any available IPv4/IPv6 address that the BIG-IP can use to receive client traffic. A corresponding record should also exist in DNS, enabling clients to resolve the external URL of your BIG-IP published application to this IP, instead of the appllication itself. Using a test PC's localhost DNS is fine for testing.
265
+
1. Enter a **Destination Address**, an IPv4 or IPv6 address BIG-IP uses to receive client traffic. Ensure a corresponding record in DNS that enables clients to resolve the external URL, of the BIG-IP published application, to the IP. Use a test computer localhost DNS for testing.
266
+
3. For **Service Port**, enter **443**, and select **HTTPS**.
267
+
4. Select **Enable Redirect Port**.
268
+
5. For **Redirect Port**, enter **80**, and select **HTTP**. This action redirects incoming HTTP client traffic to HTTPS.
269
+
6. Select the **Client SSL Profile** you created, or leave the default for testing. Client SSL Profile enables the virtual server for HTTPS. Client connections are encrypted over TLS.
276
270
277
-
2. Enter **Service Port** as *443* for HTTPS
278
-
279
-
3. Check **Enable Redirect Port** and then enter **Redirect Port**. It redirects incoming HTTP client traffic to HTTPS
280
-
281
-
4. The Client SSL Profile enables the virtual server for HTTPS, so that client connections are encrypted over TLS. Select the **Client SSL Profile** you created as part of the prerequisites or leave the default whilst testing
282
-
283
-

271
+

284
272
285
273
### Pool Properties
286
274
287
-
The **Application Pool tab** details the services behind a BIG-IP, represented as a pool containing one or more application servers.
288
-
289
-
1. Choose from **Select a Pool**. Create a new pool or select an existing one
290
-
291
-
2. Choose the **Load Balancing Method** as *Round Robin*
275
+
The **Application Pool** tab has services behind a BIG-IP, a pool with one or more application servers.
292
276
293
-
3. For **Pool Servers** select an existing node or specify an IP and port for the servers hosting the Oracle EBS application.
277
+
1. From **Select a Pool**, select **Create New**, or select another option.
278
+
2. For **Load Balancing Method**, select **Round Robin**.
279
+
3. Under **Pool Servers**, select and enter an **IP Address/Node Name** and **Port** for the servers hosting Oracle EBS.
280
+
4. Select **HTTPS**.
294
281
295
-

282
+

296
283
297
-
4. The **Access Gate Pool** specifies the servers Oracle EBS uses for mapping an SSO authenticated user to an Oracle E-Business Suite session. Update **Pool Servers** with the IP and port for of the Oracle application servers hosting the application
284
+
4. Under **Access Gate Pool** confirm the **Access Gate Subpath**.
285
+
5. For **Pool Servers** select and enter an **IP Address/Node Name** and **Port** for the servers hosting Oracle EBS.
286
+
6. Select **HTTPS**.
298
287
299
-

288
+

300
289
301
290
#### Single Sign-On & HTTP Headers
302
291
303
-
The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. As the Oracle EBS application expects headers, enable **HTTP Headers** and enter the following properties.
292
+
The Easy Button wizard supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO to published applications. The Oracle EBS application expects headers, enable HTTP headers.
0 commit comments