Manual Chapter :
Access Policies
Applies To:
Show Versions
BIG-IQ Centralized Management
- 8.3.0, 8.2.0, 8.1.0, 8.0.0
Access Policies
About per-session and per-request policies
Access in BIG-IQ Centralized Management provides two types of policies.
- Per-session policy
- The per-session policy runs when a client initiates a session. Depending on the actions you include in the access policy, it can authenticate the user and perform other actions that populate session variables with data for use throughout the session.
- Per-request policy
- After a session starts, aper-request policyruns each time the client makes an HTTP or HTTPS request. A per-request policy can include a subroutine, which starts a subsession. Multiple subsessions can exist at one time.
One per-session policy and one per-request policy are specified in a virtual server.
About access policies
In an access policy, you define the criteria for granting access to various servers,
applications, and other resources on your network. An access policy can be either a per-session
policy or a per-request policy. You create an access policy by creating an access profile, which
automatically creates a blank access policy. Every access profile has an access policy associated
with it. You configure that access policy through the access profile, using the Visual Policy
Editor.
View an access policy
After you've imported a device, you can view the access policies that are configured on it. An access policy is either a per-session policy or a per-request policy. In either case, an access policy is made up of policy items, such as Start, Logon, Deny, and macros. A
macro
is a sub-policy with a beginning, one or more policy items, and one or more endings. These policies are deployed to all the devices in the Access group. You can view the properties of the actions and the flow of actions in the policy.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of the Access group that interests you.A new screen displays the group's properties.
- On the left, expandProfiles / Policies, clickAccess Profiles (Per-Session Policies) (Shared)orPer-Request Policies(Shared).A new screen opens, showing a list of access policies associated with this Access group.
- Select an access policy.The VPE screen opens.
- Use the vertical and horizontal scrollbars to move to another section of the policy.
- To save your changes, click theSavebutton.
- To close the screen, click theClosebutton.
Create an access profile and per-session policy
You must create a access profile and its accompanying per-session policy before you can configure it in the visual policy editor.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of an Access group you would like to add an access profile to.A new screen displays the group's properties.
- On the left, expandProfiles / Policiesand clickPer-Session Policies.The Per-Session Policies (Shared) screen opens, displaying a list of access policies associated with this Access group.
- ClickCreate.The New Access Policy screen opens.
- SelectBasicorAdvanced.
- In theNamefield, type a name for the access profile.A access profile name must be unique among all access profile and any per-request policy names.
- From theProfile Typelist, select one these options:
- LTM-APM: Select for a web access management configuration.
- SSL-VPN: Select to configure network access, portal access, or application access. (Most access policy items are available for this type.)
- ALL: Select to support LTM-APM and SSL-VPN access types.
- SSO: Select to configure matching virtual servers for Single Sign-On (SSO).No access policy is associated with this type of access profile
- RDG-RAP: Select to validate connections to hosts behind APM when APM acts as a gateway for RDP clients.
- SWG - Explicit: Select to configure access using Secure Web Gateway explicit forward proxy.
- SWG - Transparent: Select to configure access using Secure Web Gateway transparent forward proxy.
- System Authentication: Select to configure administrator access to the BIG-IP system (when using APM as a pluggable authentication module).
- Identity Service: Used internally to provide identity service for a supported integration. Only APM creates this type of profile.You can edit Identity Service profile properties.
Depending on licensing, you might not see all of these profile types.Additional settings display. - From theScopelist, retain the default value or select another.
- Profile: Gives a user access only to resources that are behind the same per-session profile. This is the default value.
- Virtual Server: Gives a user access only to resources that are behind the same virtual server.
- Global: Gives a user access to resources behind any per-session profile that has global scope.
- In the Language Settings area, add and remove accepted languages, and set the default language. This setting does not display if the profile type is RDG-RAP.A browser uses the highest priority accepted language. If no browser language matches the accepted languages list, the browser uses the default language.
- Settings
- If you selectAdvancedin theGenerallist, select the appropriate profile type, and theSettingssection is available, expandSettings.
- In theInactivity Timeoutfield, type the inactivity timeout for the connection, in seconds. If there is no activity (defined by theSession Update ThresholdandSession Update Windowsettings in the Network Access configuration) between the client and server within the specified threshold time, the system closes the current session. By default, the timeout is 900 seconds. However, if an inactivity timeout value is set, when server traffic exceeds the specified threshold, the inactivity timeout is reset. To disable the inactivity timeout, set theInactivity Timeoutto 0.If you disable the inactivity timeout, a session can only be terminated by user logout, maximum session timeout, or administrator termination.
- In theAccess Policy Timeoutfield, enter the duration of the policy timeout. This means that the various security checks contained within the policy (endpoint security checks, authentication checks, and so on) must execute completely within the specified time duration. By default, the timeout is 300 seconds.
- In theMaximum Session Timeoutfield, type the maximum lifetime of one session, in seconds.The maximum lifetime is between the time a session is created, to when the session terminates. By default, it is set to604800seconds (one week). If you set this to 0 (zero), it means no limit.
- In theMinimum Authentication Failure Delayfield, type the minimum number of seconds to delay before displaying an error after authentication failure. APM inserts a random number of seconds of delay after authentication failure that varies between the value in this setting and the value in theMaximum Authentication Failure Delaysetting. APM defaults to 2 seconds. The delay affects the following authentication types: Active Directory, HTTP, Kerberos, LDAP, local user database, one-time password verification, Oracle Access Manager, RADIUS, SecurID, and TACACS+.
- In theMaximum Authentication Failure Delayfield, type the maximum number of seconds of delay before displaying an error after authentication failure. The default is 5 seconds.Set this value to no more than one-half the value of the Access Policy Timeout setting and no more than 65 seconds greater than the value of the Minimum Authentication Failure Delay setting.
- In theMax Concurrent Usersfield, type the number of sessions per access profile. The default value is0, which represents unlimited sessions.Only superAdmins have access to this field. No other admin roles will be able to modify this field.
- In theMax Sessions Per Userfield, type the number of sessions that a user can simultaneously have active. The default value is0. Please note that only superAdmins and application editors have access to this field. No other admin roles will be able to modify this field.
- 0= no limit to the number of sessions that a user can have active.
- 1-1000= the limit is enforced.
- 1001= the configuration will fail the input is greater than 1000.
- In theMax in Progress sessions Per Client IPfield, type the maximum number of sessions that can be in progress for a client IP address. The default value is 128. Please note that only superAdmins have access to this field. No other admin roles will be able to modify this field. Setting this value to 0 (unlimited) is not recommended.
- Select theRestrict to Single Client IPoption to limit a session to a single IP address. Please note that only superAdmins and Application Editors have access to this field. No other admin roles will be able to modify this field.
- Select theUse HTTP Status 503 for Error Pagesoption to have BIG-IQ send HTTP response code 503 for error pages to clients.By default, this option is not selected and BIG-IQ sends HTTP response code 200.
- SelectWebtop Redirect on Root URIto redirect the client to the webtop UI when the client accesses the root URI during a session that has a webtop resource assigned.If you do not enable this option, BIG-IQ forwards the request when the client accesses the root URI during a validated session with a webtop resource assigned.
- Configurations
- If you selectedAdvancedin theGenerallist, select the appropriate profile type, and in theConfigurationssection, expandConfigurations.
- ForLogout URI Include, add one or more logoff URIs that the access profile searches in order to terminate the Access Policy Manager session. This option is used with HTTP applications.
- In theLogout URI Timeout (in seconds)field, type the timeout used to delay logout for the customized logout URIs defined in the logout URI Include list.
- From theMicrosoft Exchangelist, select a Microsoft Exchange profile. This profile is defined in the application access area of the Configuration utility.The default value isNone.
- From theUser Identification Methodlist, select how to identify users. The list includes methods specified by theProfile Type.
- From theOauth Profilelist, select an OAuth profile configuration, defined in the Federation area in Access.
- SSO Across Authentication Domains (Single Domain)
- If you selectedAdvancedin theGenerallist, select the appropriate profile type, and expand theSSO Across Authentication Domains (Single Domain)section.
- In theDomain Cookiefield, type the name of the domain in which the cookie will be used for access.
- ForCookie Options, select one of the following options:
- SelectSecureto add the secure keyword to the session cookie.
- SelectPersistentfor a web access management session only is used for an LTM-BIG-IQ access profile type.
- SelectHTTP onlyto include an HTTPOnly flag in a Set-Cookie HTTP response header if the session is HTTP only.
- SelectSamesiteto enforce same-site usage and prevent the session cookie from being included with cross-site requests.You can set the attribute toStrictto only include the cookie with requests originating from the same site as the cookie;Laxto include the cookie with same-site requests and with top-level cross-site navigations that use a safe HTTP method; andNoneto not enforce same-site origin. If the latter option is selected, requests must follow the HTTPS protocol, andSecureis automatically selected and cannot be altered.
- From theSSO Configurationlist, select the SSO configuration you want applied to the domain.
- Log Settings
- If you selectAdvancedin theGenerallist, select the appropriate profile type and expand theLog Settingssection.
- ForLog Settings, from theAvailablelist, move log settings that you want to active to theActivelist.
- ClickSave & Close.
The policy name appears on the Per-Session Policies (Shared) screen.
Create a per-request policy
You must create a per-request policy before you can configure it in the visual policy editor.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of an Access group.A new screen displays the group's properties.
- On the left, expandACCESS POLICIESand clickPer-Request Policies.The Per-Request Policies (Shared) screen opens, displaying a list of access policies associated with this Access group.
- ClickCreate.The per-request policy creation screen opens.
- In theNamefield, type a name for the policy.A per-request policy name must be unique among all per-request policy and access profile (per-session policy) names.
- Enter aPartition. The default isCommon. You can also enter a custom path to a partition you have created. Only users with access to a partition can view the objects that the partition contains. If the object resides in theCommonpartition, all users can access it.
- From theIncomplete Actionsetting, select an option to specify whether you want to allow or deny an incomplete session request.
- To add additional languages, select them from theAvailablelist and move it to theSelectedlist.
- Click theSavebutton.
The policy name appears on the Per-Request Policies (Shared) screen.
Edit an access policy
You can edit an existing access policy using the Access Visual Policy Editor (VPE) if the policy items are action, ending, or macro calls. Although Start and In are policy items, you cannot edit them. You can undo any edited actions, and if you cancel an editing session before saving, the Policy Editor makes no changes to the policy. However, some actions or objects cannot be undone or discarded. These include the following:
- Creating a per-session policy macro.
- Creating a per-request policy macro, subroutine, or subroutine macro.
- Creating new endings or terminals
- Deleting endings or terminals.
- Changing macros or subroutine properties.
- Modifying any policy ending or macro terminal.
These actions can't be undone and also can't be undone if there are any pending diagram changes.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of the Access group that interests you.A new screen displays the Access group properties.
- On the left, expandProfiles / Policies, and clickAccess Profiles (Per-Session Policies) (Shared)orPer-Request Policies(Shared).A new screen opens, showing a list of access policies associated with this Access group.
- Select an access policy.The VPE screen opens.
- Modify the policy by clicking the diagram to insert new items, modify existing items, delete items, or change endings.
- Undoreturns you to the access policy before your most recent change.
- Redoallows you to redo an action you have undone.
- Revertreturns the access diagram to the state before you made any changes to the diagram.
- ClickSave.Saving the policy saves all changes in the policy diagram, including all workflows and modified macros. You can also discard pending changes and macros by clickingDiscard.
Add a policy item
You can add a policy item using the Access Visual Policy Editor (VPE).
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of the Access group that interests you.A new screen displays the Access group properties.
- On the left, expandProfiles / Policies, and clickAccess Profiles (Per-Session Policies) (Shared)orPer-Request Policies(Shared).A new screen opens, showing a list of access policies associated with this Access group.
- Select an access policy.The VPE screen opens.
- Move your mouse over a policy branch, depicted by the blue line.An add icon (+) displays.
- Click the (+) icon.The Item Insertion Selection popup screen opens.
- From the selection list on the left, select the type of policy item.Example:Logon, orAuthentication.The screen displays a list of policy items on the right.
- From either theCaptionorDescriptionlist, select a policy item.Another popup screen with properties and branch rules opens.
- On the Properties tab, modify or fill in the fields.
- To add a new branch rule or select an existing rule from the list, on the Branch Rules tab, clickAdd.
- Click eitherSimpleorAdvanced, and modify the branch rule.
- Click theSavebutton.
The policy item displays in the VPE at the location on the policy branch where you clicked the add icon (+).
Add an action item or macro-call to a policy
You can modify an existing policy or sub-policy by adding additional action items and macro-calls. When modifying a policy, such as a macro, all diagram operations, insertions, deletions, modifications, and branch swaps are the same from the policy or sub-policy.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of the Access group that interests you.A new screen displays the group's properties.
- On the left, expandProfiles/Policies, and clickAccess Profiles (Per-Session Policies) (Shared)orPer-Request Policies (Shared).A new screen opens, showing a list of access policies associated with this Access group.
- Select an access policy.The VPE screen opens. The macros that you can insert are in the Insertion dialog that displays when you click the + button.
- Hover your cursor over a branch line between two items.An add icon (+) displays.
- Click the icon+.The Item Insertion Selection popup screen opens.
- From the Item Insertion Selection screen, select a macro or an action item.A new screen opens if you select an action item.
- Fill in the relevant parameters and fields.
- ClickBranch Rules.
- ClickAdd.The Branch Rules popup section displays more settings.
- On the left, select eitherSimpleorAdvancedto create a branch rule configuration.
- Fill in the relevant parameters and fields.
- ClickOK.The new branch rule displays in the Branch Rules screen.
- Click theSavebutton.TheSavebutton is only enabled if the form is valid.
The Access policy now includes the new action item.
Swap policy branches
When examining the policy workflow, you can swap one branch with another. You swap branches as an easy way to change the policy workflow without deleting the existing branches and creating new ones. Swapping branches does not change the order of the branch rule, only the destination of the two branches involved in the swap. When moving a branch, a highlighted bold blue line indicates that the swap is allowed. You cannot swap branches from an agent's upstream and downstream agent branches.
- At the top of the screen, selectConfiguration, then on the left side of the screen, click .
- Click the name of the Access group that interests you.A new screen displays the group's properties.
- On the left, expandProfiles/Policies, and clickAccess Profiles (Per-Session Policies)s (Shared)orPer-Request Policies(Shared).A new screen opens, showing a list of access policies associated with this Access group.
- Select an access policy.The VPE screen opens.
- Click a branch and hold your mouse button.
- Drag the branch up or down.A red dotted line previews where the branch ends up.
- Release your mouse button.The VPE displays an access policy with swapped branches.
- Click theSavebutton when you are done editing the policy.
About timeouts and crashes
During an editing session, if you remain inactive for a prolonged period of time, the session times out. Other times, the browser might freeze. In either case, you might have to prematurely terminate an editing session without a chance to save your changes. However, regardless of why you had to terminate a session,
BIG-IQ® Centralized Management saves a draft of the policy and saves any unsaved macro when you make a modification. The next time you log in, locate the policy, and open the editing screen. The system notifies you that an unsaved draft exists, and prompts you to select whether you want to continue editing the draft or start over.
The system saves the change history in the draft, so actions such as Undo and Redo work for all changes you make before the session was interrupted. Lastly, if someone else was the previous editor, you can see the user and the time of the last edit. This allows you to choose whether or not to resume that person's editing session.
Per-Session and per-request policy comparison
The table summarizes per-session policy and per-request policy similarities and differences.
Feature | Per-Session policy | Per-request policy |
---|---|---|
Supports macros | Yes | Yes |
Requires that users click an Apply Access Policy link to go into effect. | Yes | No |
When run | At session start. | After session is created, on every request. |
Policy ending types | Allow, Deny, Redirect; endings apply to the session. | Allow, Redirect, Reject; endings apply to URL requests processed in the per-request policy. A Reject ending triggers the Deny ending in the access policy. |
Supports variables | Creates session variables that are available throughout a session. | Reads available session variables.
Creates per-flow variables that are available only while the per-request policy runs. |