Big Ip Access Policy Manager Ds
Big Ip Access Policy Manager Ds
BIG-IP Access
Policy Manager
With digital transformation touching every part of an enterprise today, native cloud and
Software as a Service (SaaS) applications are now the enterprise application standard. Many
organizations, though, find that they are unable or unwilling to migrate all of their applications
to the cloud. There may be mission-critical classic or custom applications that should not
or cannot support being migrated to the public cloud or be easily replaced by a SaaS
application. Applications are being hosted in a variety of locations, with differing and many
times disparate authentication and authorization methods that are unable to communicate
with each other and can’t work seamlessly across existing SSO or federated identity, that are
unable to support the newest identity means like Identity as a Service (IDaaS), and are not
equipped to support multi-factor authentication (MFA).
F5® BIG-IP® Access Policy Manager® (APM) is a secure, flexible, high-performance access
management proxy solution managing global access to your network, the cloud, applications,
and application programming interfaces (APIs). Through a single management interface,
BIG-IP APM consolidates remote, mobile, network, virtual, and web access. With BIG-IP APM,
you can create, enforce, and centralize simple, dynamic, intelligent application access policies
for all of your apps, regardless of where or how they are hosted.
KEY BENEFITS B R I D G I N G S E C U R E A P P L I C AT I O N A C C E S S
Simplify access to all apps
Modern authentication and authorization protocols—including Secure Assertion Markup
Bridge secure access to on-
premises and cloud apps with a Language (SAML), and OAuth with OpenID Connect (OIDC)—reduce user dependency on
single login via SSO. It even works passwords, increase security, and improve user experience and productivity. However, not all
for applications unable to support applications support modern authentication and authorization protocols. Many applications,
modern authentication such
such as classic applications or custom-built applications, support classic authentication
as Security Assertion Markup
Language (SAML), or OAuth and and authorization methods, such as Kerberos, NT LAN Manager (NTLM), RADIUS, header-
OpenID Connect (OIDC). based, and more. This further complicates application access and security. The need to
Zero trust application access support different, disparate protocols unable to share user authentication and authorization
Identity Aware Proxy (IAP) delivers information inhibits the use of SSO and MFA. That in turn negatively impacts user experience
a zero trust model validation for and application security. It also makes it difficult to adapt modern corporate password
application access based on
policy of periodic password changes, and increases organizational costs as multiple access
identity-awareness and granular
context, securing every app methods become necessary.
access request without the need
of a VPN. BIG-IP APM serves as a bridge between modern and classic authentication and authorization
protocols and methods. For applications which are unable to support modern authentication
Secure web access
and authorization protocols, like SAML and OAuth with OIDC, but which do support
Control access to web-based
applications and web content classic authentication methods, BIG-IP APM converts user credentials to the appropriate
centralizing authentication, authentication standard supported by the application. BIG-IP APM ensures that users or
authorization, and endpoint
organizations can use SSO to access any application anywhere—regardless of its location
inspection via web app proxy.
(on-premises, in a data center, in a private cloud, or in the public cloud as a native cloud
Centralize and manage access or SaaS application), or whether or not it supports modern or classic authentication and
control
Consolidate management of authorization. This helps decrease the number of passwords users have to create, remember,
remote, mobile, network, virtual, and use, helping to stem the tide of credential-based attacks. It enables compliance with
and web access in a single control modern corporate policies of periodic password changes to combat stolen credentials. It
interface with adaptive identity
also decreases the cost to organizations of having to purchase and maintain separate access
federation, SSO, and MFA via
dynamically enforced, context- solutions for applications hosted on-premises, in a data center, and in a private cloud, versus
based and identity-aware policies. native cloud and SaaS apps.
Support for OAuth 2.0 open-standard for authorization enables BIG-IP APM to serve as a
client, as an authorization delegate for SaaS applications, and can enhance protection for and
authorization of APIs for web services.
BIG-IP APM supports Proof Key for Code Exchance (PKCE), a more secure authorization flow
based on OAuth 2.0 that improves security for all OAuth clients (including mobile and public).
Defend your weakest links tokens. PKCE enables apps to make direct requests to the token provider, adding an extra
Protect against data loss, layer of security for public apps.
malware, and rogue device
access with comprehensive,
continuous endpoint integrity SUPPORT FOR IDAAS
and security checks.
With support for SSO and Kerberos ticketing across multiple domains, BIG-IP APM enables
Protect APIs
Enable secure authentication for additional types of authentication, such as U.S. Federal Government Common Access Cards
REST APIs and integrate OpenAPI (CAC) and the use of IDaaS—such as Azure Active Directory (Azure AD), Okta, and others—to
or “swagger” files to ensure access all applications regardless of location or modern authentication and authorization
appropriate authentication actions
support. For instance, users can be automatically signed on to back-end applications and
while saving time and cost.
services that are part of a Kerberos realm. This provides a seamless authentication flow once
Do it all at scale
a user has been authenticated through a supported user-authentication mechanism. BIG-IP
Support all users easily, quickly,
and cost-effectively with no
APM also supports smart cards with credential providers, so users can connect their devices
performance trade-offs for to their network before signing in.
security, even in the most
demanding environments.
S U P P O R T F O R M FA
Through F5’s extensive partner ecosystem, BIG-IP APM also integrates with most leading
MFA solutions, including those from Cisco Duo, Okta, Azure AD, and others. By integrating
with your existing MFA solution, BIG-IP APM enables adaptive authentication, allowing various
forms of single-, two-, or multi-factor authentication to be employed based on user identity,
context, and application access. In addition, to help you deploy MFA, BIG-IP APM includes
one-time password (OTP) authentication via email or SMS.
After the user has logged into an application, an additional means of authentication may be
required to ensure secure access to mission-critical or particularly sensitive applications and
files. This is commonly referred to as step-up authentication. BIG-IP APM supports step-up
authentication for single- and multi-factor authentication. Any session variable may be used
to trigger step-up authentication, and you can use additional authentication capabilities or
select from our partner offerings. In addition, any session variable may be part of access
policy branching (such as URL branching) per request policy. Step-up authentication policies
may be based on applications, secure portions of applications, sensitive web URIs, extending
sessions, or any session variable.
Many authentication solutions use application coding, separate web server agents, or
specialized proxies that present significant management, cost, and scalability issues. With
AAA control, BIG-IP APM enables you to apply customized access policies across many
applications and gain centralized visibility of your authorization environment. You can
consolidate your AAA infrastructure, eliminate redundant tiers, and simplify management
to reduce capital and operating expenses.
A zero trust approach to security means adopting a mindset that attackers have already
infiltrated your network and are lurking, waiting for an opportunity to launch an attack. It
eliminates the idea of a trusted insider within a defined network perimeter, assuming, at best,
a limited secure network perimeter. It encourages never trusting users, even if they’ve already
been authenticated, authorized, and granted access to applications and resources. A zero
trust security approach applies least privilege rights to user access, allowing users to access
only those applications and resources they are authorized for, and restricting their access to a
single application or resource at a time.
Identity- and context-awareness are also what define Identity Aware Proxy (IAP). IAP enables
secure access to specific applications by leveraging a fine-grained approach to user
authentication and authorization. IAP enables only per-request application access, which is
very different than the broad network access approach of VPNs that apply session-based
access, which is not a zero trust approach. With this approach, VPN becomes optional to
access applications. IAP enables the creation and enforcement of granular application access
policies based on contextual attributes, such as user identity, device integrity, and user
location. IAP relies on application-level access controls, not network-layer rules. Configured
policies reflect user and application intent and context. IAP requires a strong root of trusted
identity to verify users, and to stringently enforce what they are authorized to access.
Identity Aware Proxy is key to both a zero trust security architecture and to F5 BIG-IP APM.
BIG-IP APM and F5 Access Guard deliver Identity Aware Proxy using a zero trust validation
model on every application access request. Providing authenticated and authorized users
secure access to specific applications, it leverages F5 best-in-class access proxy. BIG-IP APM
centralizes user identity and authorization. Authorization is based on the principles of least
privileged access.
Through IAP, BIG-IP APM examines, terminates, or authorizes application access requests.
Policies within BIG-IP APM can be created to:
• And more
Data from user and entity behavior analytics (UEBA) and other API-driven risk engines can be
integrated seamlessly adding another level of security and application access control.
BIG-IP APM checks user device security posture via F5 Access Guard, a browser extension that
coordinates with BIG-IP APM. However, BIG-IP APM and F5 Access Guard go beyond simply
checking device integrity at authentication to deliver continuous, ongoing device posture
checks, ensuring that user devices not only meet but adhere to endpoint security policies
throughout application access. If BIG-IP APM detects any change in device integrity, it can either
limit or stop application access, halting potential attacks before they can even be launched.
BIG-IP APM, through IAP, also simplifies application access for remote or home-based workers
and better enables and secures application accessibility, and optionally eliminates the need
for VPNs.
BIG-IP APM inspects and assesses users’ endpoint devices before authentication and
throughout the user’s application access with F5 Access Guard. F5 Access Guard examines
device security posture and determines if the device is part of the corporate domain. Based
on the results, BIG-IP APM will apply dynamic access control lists (ACLs) to deploy context-
based security. BIG-IP APM and F5 Access Guard include preconfigured, integrated endpoint
inspection checks, including checks for OS type, antivirus software, firewall, file, process,
registry value validation and comparison (Windows only), as well as device MAC address, CPU
ID, and HDD ID. For mobile devices running iOS or Android, BIG-IP APM’s endpoint inspection
checks the mobile device UDID and jailbroken or rooted status.
Many organizations have deployed third-party user and entity behavior analytics (UEBA)
or risk engines. The ability to leverage an existing UEBA or risk engine to infuse real-time
analytics and risk data within their access control policies can help those organizations
ensure that access to networks, clouds, applications, and even APIs, are regulated based on
a risk profile. It is also important to address risk-based access to networks, clouds, apps, and
APIs that is triggered by a variety of relevant variables.
Through its HTTP Connector, BIG-IP APM integrates with third-party UEBA and risk engines,
leveraging their risk assessment via REST APIs as part of its policy-based access controls.
This enables risk-based access to networks, clouds, apps, and APIs, further enhancing BIG-IP
APM’s zero trust IAP solution. BIG-IP APM’s HTTP Connector leverages user group, domain,
and network-based triggers to increase the enforceability of risk-based access. Risk-based
access enhances security, providing greater visibility and analytics to determine whether to
grant or deny access to your networks, cloud, applications, and APIs.
I N T E L L I G E N T I N T E G R AT I O N W I T H I D E N T I T Y A N D A C C E S S
MANAGEMENT (IAM)
F5 partners with leading on-premises and cloud-based identity and access management (IAM)
vendors, such as Microsoft, Okta, and Ping Identity. This integration enables local and remote
user SSO via SAML, OAuth or FIDO2 (U2F) to applications based on premises or in a data
center. For organizations that do not wish to replicate their user credential store in the cloud
with IDaaS or cloud-based IAM offerings, working with its partners, F5 and BIG-IP APM work to
help these organizations maintain control of on-premises user credentials. This is accomplished
by creating a bridge between the IAM vendor’s offering and the local authentication services.
This bridge, or identity provider chain, leverages SAML to federate user identity.
BIG-IP APM is positioned between your applications and your users, providing a strategic
application access control point. It protects your public-facing applications by providing
granular policy for identity- and context-aware user access, while consolidating your access
infrastructure. It secures remote and mobile access to applications, networks, and clouds
via SSL VPN or zero trust application access. BIG-IP APM converges and consolidates all
access—network, cloud, application, and API—within a single management interface. It also
enables and simplifies the creation of easy to manage dynamic access policies.
BIG-IP APM enables Datagram Transport Layer Security (DTLS) mode, supporting DTLS 2.0
for remote connections that secure and tunnel delay-sensitive applications. It supports IPsec
encryption for traffic between branch offices or data centers. Per-app VPN via an application
tunnel through BIG-IP APM enables access to a specific application without the security risk of
opening a full network access tunnel.
F5 BIG-APM enables secure access to applications, networks, and clouds via the BIG-IP
Edge Client and F5 Access. The BIG-IP Edge Client is available for Apple MacOS, Microsoft
Windows, Linux platforms, Chromebooks, and includes support for Windows on ARM64
devices. F5 Access is an optional mobile client for ensuring secure access from mobile
devices supporting Apple iOS and Google Android, and is available for download from the
Apple App Store or Google Play.
BIG-IP Edge Client and F5 Access integrate with leading mobile device management (MDM)
and enterprise mobility management (EMM) solutions—including VMware Horizon ONE
(AirWatch), Microsoft Intune, and IBM MaaS360—to perform device security and integrity
checks and to deliver per-app VPN access without user intervention. Context-aware policies
are assigned based on a device’s security state. These policies enable, modify, or disable
application, network, and cloud access from the device. Hardware attributes may be mapped
to a user’s role to enable additional access control decision points. A browser cache cleaner
automatically removes any sensitive data at the end of a user’s session.
Biometrics, such as fingerprint access, are supported to open and access the F5 Edge Client.
This simplifies access, since a user will no longer need to create, remember, and input a
username/password credential to access the Edge Client. It also makes accessing the Edge
Client more secure, as users reuse passwords or create simple username/password pairs,
making them easier for attackers to hack.
BIG-IP APM also supports server authentication via Client Certificate Constrained Delegation
(C3D). By employing C3D, BIG-IP APM addresses certificate-based authentication, limiting the
need for and use of credentials. With C3D, organizations can implement stronger encryption
protocols and the latest key exchanges, as well as employ client certificate authentication,
enable end-to-end encryption in reverse proxy environments, leverage Perfect Forward
Secrecy (PFS), and validate client certificates using Online Certificate Status Protocol (OCSP).
As organizations focus on reducing user friction and increasing agility, their need to provide
seamless access to all applications becomes a priority. BIG-IP APM enables organizations
to reduce friction for users to remote access (SSL VPN). It also reduces friction for web
applications, as well. BIG-IP APM supports SSO across both remote access and web
applications with a single login for either Apple Macs or Microsoft Windows devices (via
Windows Hello For Business). Organizations are able to support the user login via U2F tokens
(such as Yubico keys) or password-less FIDO2 via the F5 Edge Client to reduce user friction
and increase application access security.
S T R E A M L I N E V I R T U A L A P P L I C AT I O N A C C E S S
Virtual desktop and application deployments must scale to meet the needs of thousands of
users and hundreds of connections per second. BIG-IP APM serves as a gateway for virtual
application environments. It includes native support for Microsoft Remote Desktop Protocol
(RDP), native secure web proxy support for Citrix XenApp and XenDesktop, and security
proxy access for VMware Horizon. Administrators can control the delivery and security
components of enterprise virtualization solutions via BIG-IP APM’s unified access, security,
and policy management. These scalable, high-performance capabilities simplify user access
and control in hosted virtual desktop environments. BIG-IP APM delivers simple, broad virtual
application and desktop support.
BIG-IP APM supports two-factor authentication via RSA SecureID and RADIUS through the
native client for VMware End User Computing (EUC) deployments. BIG-IP APM supports
Citrix Virtual Apps and Desktops and Citrix StoreFront. BIG-IP APM, when integrated with
the Microsoft RDP protocol, enables the remote desktop access needed to install client-side
components or run Java. It allows Microsoft RDP to be available for use on new platforms,
such as Apple iOS and Google Android devices. It also enables native RDP clients on non-
Windows platforms such as Mac OS and Linux, where previously only a Java-based client
was supported. BIG-IP APM’s Microsoft RDP support works with any Microsoft, Apple, or
Google web browser, or RDP app installed.
PROTECTING APIs
APIs are the connective tissue in modern application architectures. Attackers are leveraging
APIs to launch attacks, because they are ripe for exploitation: Many organizations expose APIs
to the public and their supply chain partners or they inadvertently leave them unprotected.
While attackers are exploiting APIs to launch attacks, organizations can ensure API security via
SECURING CREDENTIALS
User credentials are like the keys to the kingdom: All an attacker has to do is steal one set of user
credentials, and they can enjoy unfettered access to your organization’s network, clouds, and apps.
BIG-IP APM’s credential protection, as part of an optional license of BIG-IP DataSafe™, secures
credentials from theft and reuse. It protects against Man-in-the-Browser (MitB) attacks with
real-time, adaptable login encryption, and encrypts user credentials entered into its webtop.
BIG-IP APM, in conjunction with BIG-IP DataSafe, renders the credentials unreadable and
unusable, even in the unlikely event an attacker successfully steals them. BIG-IP APM also
ensures login security for all applications associated via federation.
F 5 D I S T R I B U T E D B O T D E F E N S E — B U I LT I N T O T H E
B I G - I P P L AT F O R M
Bots cause significant financial pain through scraping that slows performance, scalping
and inventory hoarding that frustrate loyal customers, enumerating gift card codes to steal
balances, creating fake accounts to commit fraud, and credential stuffing—the testing of
stolen credentials—that leads to account takeovers.
Today’s advanced persistent bots are more sophisticated than ever, evading many standard
bot defenses available within WAFs. Criminals will retool bots to bypass defenses within
hours, utilize millions of valid IP addresses, rapidly solve CAPTCHAs, mimic human behavior,
and introduce subtle randomness.
To stay ahead of attackers, F5® Distributed Cloud Bot Defense uses rich, client-side signal
collection, industry-leading code obfuscation, aggregate telemetry collection, and AI for
unparalleled long-term efficacy and near-zero false positives while maintaining access for
good bots. And because F5 defends the most targeted sites on the web—including those of
the world’s largest banks, retailers, and airlines, F5 is ready when these attacks target your
organization.
Deploy Distributed Cloud Bot Defense directly from your BIG-IP or through a connector that’s
right for your application, with support services tailored to your needs, from self-service to
managed service.
Through its advanced graphical Visual Policy Editor (VPE), BIG-IP APM makes designing and
managing granular access control policies on an individual or group basis fast and simple.
With VPE, you can efficiently create and edit entire dynamic access policies in just a few
clicks. BIG-IP APM’s VPE can define rules per URL path. By centralizing and simplifying the
management of contextual policies, you can efficiently direct fine-grained user access to
applications, networks, and clouds.
Figure 1: The BIG-IP APM advanced VPE makes it fast and easy to create, modify, and manage
granular application-, user-, network/cloud-, and vulnerability context-based access policies.
BIG-IP APM lets you design access policies for authentication and authorization, as well as
endpoint security checks, enforcing user compliance with corporate policies and industry
regulations. One access profile may be defined for all connections coming from any device,
or you can create multiple access profiles for different access methods from various devices.
BIG-IP APM enforces access authentication using ACLs and authorizes users with dynamically
applied layer 4 and layer 7 ACLs on a session. Both L4 and L7 ACLs are supported based
on endpoint posture as a policy enforcement point. Individual and group access to
approved applications and networks is allowed by BIG-IP APM using dynamic, per-session
L7 (HTTP) ACLs. The VPE in BIG-IP APM can be used to quickly and easily create, modify,
and manage ACLs.
A C C E S S G U I D E D C O N F I G U R AT I O N ( A G C )
BIG-IP APM includes an Access Guided Configuration (AGC) capability that simplifies the
deployment and management of application access. The AGC guides your administrator
through a step-by-step process of setting up and deploying BIG-IP APM, saving you
Figure 2: BIG-IP APM’s Access Guided Configuration saves deployment time and cost.
Figure 3: F5 BIG-IP APḾ’s Access Guided Configuration enables quick, simple onboarding and
management of custom applications and classic applications, such as SAP ERP and Oracle
PeopleSoft, with Azure AD.
If you have multiple BIG-IP APM deployments, F5 BIG-IQ Centralized Management® will help you
efficiently manage them. It can manage policies for up to 100 BIG-IP APM instances, enabling you
to import, compare, edit, and update granular access policies across multiple user devices.
With BIG-IQ Centralized Management and BIG-IP APM, you can import configurations from
a master “source” BIG-IP APM instance, simplifying access policy distribution. You may also
edit device- or location-specific objects directly on BIG-IQ Centralized Management and have
them propagate throughout your BIG-IP APM deployment. You can easily view the differences
between current and proposed access configurations.
Figure 4: BIG-IQ Centralized Management enables the import, comparison, editing, and
updating of access policies across multiple devices from a single interface.
An in-depth view of logs and events provides access policy session details. With reports
available through BIG-IQ Centralized Management, BIG-IP APM helps you gain greater
visibility into application access and traffic trends, aggregate data for long-term forensics,
accelerate incident responses, and identify issues and unanticipated problems before users
can experience them.
BIG-IP APM can customize reports with granular data and statistics for intelligent reporting
and analysis. Examples include detailed session reports by:
BIG-IP APM integrates with BIG-IQ Centralized Management to provide enhanced visibility
through access reports and logs. It delivers analytical reports and logs based on devices and
groups, so you can increase your insight into user access and analysis. It also helps you take
quick action if required, including the termination of specific access sessions. In addition, it
provides a CSV export of BIG-IP APM report data, so it’s accessible for customized reports.
BIG-IQ Centralized Management’s customized dashboard view helps you to better envision
trends and relationship contexts more easily. This improves your response time should issues
arise. Through this holistic view of application and network access, you can better understand
the effectiveness of the access policies you’ve established, locate and address weak points,
and enhance your responses to issues and concerns.
Figure 6: The BIG-IQ Centralized Management comprehensive dashboard for BIG-IP APM
helps you better view trends and relationship contexts.
U N P A R A L L E L E D F L E X I B I L I T Y, H I G H P E R F O R M A N C E ,
AND SCALABILITY
BIG-IP APM delivers flexible application, network, and cloud access, keeping your users
productive and enabling your organization to scale quickly and cost-effectively.
BIG-IP APM can be deployed a variety of ways to address your specific access needs.
BIG-IP APM may be:
• Included with a BIG-IP LTM Virtual Edition (VE) to deliver flexible application access in
virtualized environments
In addition to being licensed for these platforms, BIG-IP APM may also be licensed as the Best
bundle in F5’s Good-Better-Best offering, as part of F5 Enterprise Licensing Agreement (ELA)
for BIG-IP VEs, and subscription licensing models.
BIG-IP APM is available on a chassis platform and on all BIG-IP appliances. It supports the
F5 Virtual Clustered Multiprocessing™ (vCMP) environment. The vCMP hypervisor provides
the ability to run multiple instances of BIG-IP APM, resulting in multi-tenancy and effective
separation. With vCMP, network administrators can virtualize while achieving a higher level of
redundancy and control.
BIG-IP APM offers SSL offload at network speeds and supports up to 3,000 logins per
second. For organizations with an ever-growing base of web application users, this solution
scales quickly and cost-effectively.
BIG-IP APM use is based on two types of user sessions: access sessions and concurrent
connection use (CCU) sessions. Access sessions apply to authentication sessions, IAP, VDI, and
similar situations. CCU is applicable for network access, such as full VPN access, application
B I G - I P A P M F E AT U R E S I N C L U D E :
• Granular access policy enforcement • OIDC Proof Key for Code Exchange
(PKCE) support
• Creating and managing identity- and
context-aware policies • Support for SAML-based authentication
using BIG-IP Edge Client and F5 Access
• Policy routing
for Android and for iOS
• Support for Identity Aware Proxy (IAP)
• Support for SAML-artifact binding
enabling zero trust application access
• Support for SAML ECP profile support
• Context-based authorization with
dynamic L4/L7 ACLs • AAA server authentication and high-
availability
• SAML 2.0 identity federation support
• Step-up authentication support
• Support for OAuth 2.0 authorization
protocol • JSON Web Encryption support for
public-facing clients
• Simplified identity federation for
applications with multi-valued attributes • Multi- factor authentication (MFA) via
one-time password (OTP)
• SSO support for classic authentication
(Kerberos, header- based, etc.), • Seamless integration with third-party
credential caching, OAuth 2.0, SAML MFA solutions
2.0, and FIDO2 (U2F) • DTLS 2.0 mode for delivering and
• Integrates with third-party SSO solutions securing applications
• Credential caching and proxy for SSO • SSL VPN remote access
F5 Global Services
F5 Global Services offers world-class support, training, and consulting to help you get the
most from your F5 investment. Whether it’s providing fast answers to questions, training
internal teams, or handling entire implementations from design to deployment, F5 Global
Services can help ensure your applications are always secure, fast, and reliable. For more
information about F5 Global Services, contact [email protected] or visit f5.com/support.
©2022 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc.
DC0422 | DS-PROJ-SEC-883309267