Manual Chapter : Next steps for ephemeral authentication

Applies To:

Show Versions Show Versions


  • 17.1.0, 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Manual Chapter

Next steps for ephemeral authentication

You can examine and edit the access policy to make sure it is suited to your environment. For example, you may want to make changes to the following:
  • Logon page
  • Advanced Resource Assign objects like portal access, webtop, webtop links
  • If using portal access or webtop links as a resource, in the portal access config or webtop link, enable
    Ephemeral Authentication Resource
  • SSO (HTTP basic or Form Based)
After you have configured APM using the privileged user access, you can test ephemeral authentication by sending traffic through the BIG-IP system.
By consolidating access control for administrators, you can further configure the BIG-IP system to take advantage of additional authentication and control capabilities. You can enforce the use of TLS encryption standards across untrusted networks.
Access Policy Manager supports authentication federation models, SAML, and can facilitate the adoption cloud technology. F5 provides strong authentication for applications, devices, management interfaces, and systems within your environment, in the cloud, or wherever they may reside in the future.