You can examine and edit the access policy to make sure it is suited to your
environment. For example, you may want to make changes to the following:
Advanced Resource Assign objects like portal access, webtop, webtop links
If using portal access or webtop links as a resource, in the portal access config or webtop
Ephemeral Authentication Resource
SSO (HTTP basic or Form Based)
After you have configured APM using the privileged user access, you can test
ephemeral authentication by sending traffic through the BIG-IP system.
By consolidating access control for administrators, you can further
configure the BIG-IP system to take advantage of additional authentication and control
capabilities. You can enforce the use of TLS encryption standards across untrusted networks.
Access Policy Manager supports authentication federation models, SAML, and
can facilitate the adoption cloud technology. F5 provides strong authentication for applications,
devices, management interfaces, and systems within your environment, in the cloud, or wherever
they may reside in the future.