Manual Chapter : Typical ephemeral authentication use cases

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 16.0.0
Manual Chapter

Typical ephemeral authentication use cases

Following are typical ways of implementing privileged user access using ephemeral authentication:
  • LDAP Proxy with WebSSH
  • LDAPS Proxy with WebSSH
  • RADIUS Proxy with WebSSH
  • LDAP/LDAPS and RADIUS Proxy with WebSSH
The choice you make depends on what the backend resources require.