Manual Chapter : Typical ephemeral authentication use cases

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 17.1.0, 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Manual Chapter

Typical ephemeral authentication use cases

Following are typical ways of implementing privileged user access using ephemeral authentication:
  • LDAP Proxy with WebSSH
  • LDAPS Proxy with WebSSH
  • RADIUS Proxy with WebSSH
  • LDAP/LDAPS and RADIUS Proxy with WebSSH
The choice you make depends on what the backend resources require.