Manual Chapter :
Next steps for ephemeral authentication
Applies To:
Show VersionsBIG-IP APM
- 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Next steps for ephemeral authentication
You can examine and edit the access policy to make sure it is suited to your
environment. For example, you may want to make changes to the following:
- Logon page
- Advanced Resource Assign objects like portal access, webtop, webtop links
- If using portal access or webtop links as a resource, in the portal access config or webtop link, enableEphemeral Authentication Resource.
- SSO (HTTP basic or Form Based)
After you have configured APM using the privileged user access, you can test
ephemeral authentication by sending traffic through the BIG-IP system.
By consolidating access control for administrators, you can further
configure the BIG-IP system to take advantage of additional authentication and control
capabilities. You can enforce the use of TLS encryption standards across untrusted networks.
Access Policy Manager supports authentication federation models, SAML, and
can facilitate the adoption cloud technology. F5 provides strong authentication for applications,
devices, management interfaces, and systems within your environment, in the cloud, or wherever
they may reside in the future.