Manual Chapter : Creating a virtual server for Ephemeral Authentication

Applies To:

Show Versions Show Versions


  • 17.1.0, 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Manual Chapter

Creating a virtual server for Ephemeral Authentication

Before you begin, you need to have created the Ephemeral Access Configuration that you want to associate with a virtual server for privileged user access as well as an access policy, and a connectivity profile.
This task describes how to create the virtual server that acts as the Ephemeral Authentication server and which includes the access profile/policy containing the AAA agent to authenticate the end user and the webtop resources for ephemeral authentication.
  1. On the Main tab, click
    Local Traffic
    Virtual Servers
    The Virtual Server List screen opens.
  2. Click
    The New Virtual Server screen opens.
  3. In the
    field, type a unique name for the virtual server, such as
  4. For the
    Destination Address/Mask
    setting, confirm that the
    button is selected, and type the IP address in CIDR format (address/prefix).
    The various virtual servers being used for ephemeral authentication (LDAP, LDAPS, and/or RADIUS) can all have the same Destination Address as long as they use different service ports.
  5. In the
    Service Port
    field, select
    , port
  6. For
    Protocol Profile (Client)
    , select
  7. For
    HTTP Profile (Client)
    , select
  8. For
    SSL Profile (Client)
    , select a client profile, such as
  9. For
    Source Address Translation
    , select
    Auto Map
  10. For
    Rewrite Profile
    , select
  11. In the Access Policy section, select the
    Access Profile
    , and then the
    Connectivity Profile
    you created.
  12. In the Ephemeral Authentication section, for
    Access Configuration
    , select the Access Configuration you created.
  13. Click
The virtual server is set up for ephemeral authentication.