Manual Chapter :
Editing the access policy for LDAP with ephemeral
authentication
Applies To:
Show Versions
BIG-IP APM
- 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Editing the access policy for LDAP with ephemeral
authentication
This example shows an example of a
per-session policy that uses LDAP with ephemeral authentication. You can tailor the
policy to include other elements as needed for your network configuration.
- On the Main tab, click.The Access Profiles (Per-Session Policies) screen opens.
- In the Per-Session Policy column, click theEditlink for the access profile you want to configure.The visual policy editor opens the access policy in a separate screen.
- Click the(+)icon anywhere in the access policy to add a new item.Only an applicable subset of access policy items is available for selection in the visual policy editor for any access profile type.A popup screen opens, listing predefined actions on tabs such as General Purpose, Authentication, and so on.
- On the General Purpose tab, selectMessage Boxand clickAdd Itemto create a message to warn users that they are entering a site with restricted access.
- In the Message Box properties, type a name for the message box.
- AfterTitle, type the warning to display to users.
- ClickSave.
- To the right of the message box, click + to add a logon page.
- On the Logon tab, selectLogon Page, clickAdd Item, andSave.The logon page created uses default values that can be adjusted as needed for your environment.
- Right after the Logon Page, click + to add an LDAP query.
- On the Authentication tab, selectLDAP Queryand clickAdd Item.
- From theServerlist, select the LDAP pool created for LDAP authentication.
- Add theSearchDN(for example,dc=example,dc=org) andSearchFilter(for example,cn=%{session.logon.last.username}).
- EnableShow Extended Error.
- SetFetch groups to which the user or group belongtoDirect.
- Click the Branch Rules tab, click the x on the right to remove the default option, clickAdd Branch Rule,, name the rule, for examplePassed, and selectChange.
- ClickAdd Expression, changeContexttoLDAP Query, changeConditiontoLDAP Query Passed, and setLDAP Query hastoPassed, then clickFinished.
- At the end of the Successful branch marked passed, clickDenyand change it toAllow.If the LDAP Query is successful, the user is allowed in the restricted area.
- Right after the LDAP Query before Allow, click +.
- From the Assignment tab, selectVariable Assignand clickAdd Item.
- To add a variable, in the Variable Assign properties,clickAdd new entry.
- ClickChange, thenAdd Item.
- On the left, add the Custom Variable:session.custom.ephemeral.last.dn; this session variable is the same one used inUser LDAP DNwhen configuring .On the right, changeCustom ExpressiontoAAA Attribute, and selectLDAPforAgent Type,Use LDAP attributeforAttribute Type, and type anLDAP attribute name.
- ClickFinished.
- Add a second variable; clickAdd new entry.
- On the left, add the Custom Variable:session.custom.ephemeral.last.username; on the right, changeCustom ExpressiontoSession Variableand specify the session variable that contains the username, such assession.logon.last.username.
- ClickFinished, thenSaveto complete the Variable Assign.
- Right afterLDAP Queryon the Deny branch, click +.
- On the General Purpose tab, selectMessage Boxto create a message that informs unauthenticated users that they have been denied access.Type a name for the box such asNo, and clickSave.
- ClickAdd New Macro, name itAdmin Access, and clickSave.
- To the left of theMacro: Admin Access, click + to expand the macro, then in the macro, click +.
- From the Assignment tab, selectSSO Credential Mappingand clickSave.This enables Single Sign-On (SSO) credential caching and assigns SSO variables.
- To the right of SSO Credential Mapping, click +.
- From the Assignment tab, selectAdvanced Resource Assignand clickAdd Item.
- To add a resource, clickAdd new entry, then clickAdd/Delete.
- ClickShow more tabsthen, on the Webtop tab, select the webtop you created previously, and clickUpdate.
- To add another resource, clickAdd/Deleteagain, and on the WebSSH tab, select the WebSSH resource you created previously, and clickUpdate.
- At this point, you can similarly add Portal Access and Webtop Links resources that were previously configured, if needed.If using Portal Access or Webtop Links as resources, in the Portal Access config or Webtop Link, enableEphemeral Authentication Resource.
- ClickSave.
- Back in the visual policy editor, to the right of Variable Assign, click +, and on the Macro tab, select the macro previously created (Admin Access), and clickAdd Item.
- At the top of the screen, above the policy, clickApply Access Policy.
The access policy has the elements needed to perform ephemeral authentication using
LDAP.