Manual Chapter : Configuring Response and Blocking Pages for Leaked Credentials

Applies To:

Show Versions Show Versions

BIG-IP ASM

  • 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Manual Chapter

Configuring Response and Blocking Pages for Leaked Credentials

BIG-IP ASM with Leaked Credentials Check supports one of the following configuration options when leaked credentials are detected.
  1. Alarm and Blocking Page: Report the Leaked Credentials Detection violation in event log and send the Blocking Response Page.
  2. Alarm and Honeypot Page: Report the Leaked Credentials Detection violation in event log and send the Honeypot Response Page.
  3. Alarm and Leaked Credentials Page: Report the Leaked Credentials Detection violation in event log and send the Leaked Credentials Page.
You must evaluate the most likely scenarios for your organization. If Leaked Credentials Check is to detect an attack, you may want to select Alarm and Honeypot Page. The Failed Login Honeypot page is used for attacker deception. The page should look like an application failed login response from a mitigation. As a result, the attacker will not change identity (Source IP or Device ID) and the brute force attack will be rendered ineffective. The Honeypot page is recommended when mitigation is request blocking.
If Leaked Credentials Check is primarily to detect legitimate users who are trying to log in with a leaked password, you may want to select Alarm and Leaked Credentials Page instead. The Leaked Credentials page is the system response used when presented with credentials matching those in the leaked credentials dictionary. You can redirect the user to a new page where they are notified that their password has been compromised and ask them to reset their password or use MFA to log in
For more information on configuring Response Pages, see the F5 BIG-IP Application Security Manager Implementation Guide and the Response and Blocking Pages online help.
  1. On the Main tab, click
    Security
    Application Security
    Security Policies
    Policies List
    and select the desired policy from the list.
  2. Select the
    Response and Blocking Pages
    tab.
  3. Select the
    Failed Login Honeypot
    response.
  4. Select the
    Leaked Credentials
    response.
  5. Click
    Save
    .