Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Access Policy Manager (APM)

APM is a flexible, high-performance access and security solution that lets you control who can access your network and data. By consolidating remote access, LAN access, web access, and wireless connections into a single management interface, you free up IT resources while you effectively secure and scale access.

Learn more

Articles

Matt Mabis
Updated 1 week ago by Matt Mabis

Provide a Technical update on some new hotfixes that were rolled out to resolve some issues with HTML5 connectivity with Horizon 7.1 and 7.2 with APM.

Graham
Updated 1 week ago by Graham
5 out of 5 stars

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!

Peter Silva
Updated 3 weeks ago by Peter Silva
5 out of 5 stars

In this Lightboard, I light up some lessons on BIG-IP Access Policy Manager. BIG-IP APM provides granular access controls to discreet applications and networks supporting 2FA and federated identity management. You can also check out Chase's...

Chase Abbott
Updated 1 month ago by Chase Abbott
5 out of 5 stars

F5 Access and BIG-IP Edge are VPN clients that connect to APM access policies for L3 network connectivity.

Christopher_Ries
Updated 1 month ago by Christopher_Ries

The product leadership team has eliminated a feature of APM called BIG-IP Edge Portal, and this feature will not be compatible with future versions of iOS and Android.

Chase Abbott
Updated 1 month ago by Chase Abbott
5 out of 5 stars

F5 BIG-IP APM provides granular access controls to discreet applications and networks supporting 2FA and federated identity management.

Matt Mabis
Updated 1 month ago by Matt Mabis

A few months back VMware announced a joint collaborative effort on delivering even more applications to their Workspace One suite utilizing F5 BIG-IP APM to act as an authentication translator from SAML to legacy Kerberos and header-based web...

Peter Silva
Updated 5 months ago by Peter Silva

As more organizations use APIs in their systems, they've become targets for the not-so-good-doers so API Security is something you need to take seriously. Most APIs today use the HTTP protocol so organizations should protect them as they would...

Peter Silva
Updated 5 months ago by Peter Silva

Password fatigue is something we’ve all experienced at some point. Whether it’s due to breaches and the ever present, ‘update password’ warnings, the corporate policy of a 90-day rotation or simply registering for a website with yet another unique...

Jason Rahm
Updated 2/23/2017 by Jason Rahm
5 out of 5 stars

As I prepped for this password killing journey, I couldn’t get the Fugees “Killing Me Softly” out of my head. Lauryn Hill kills it in that song (pun intended.) So I wrote a little intro you can hum along to the tune…I’ll wait. Feeling my pain...

Graham
Updated 1 week ago by Graham
5 out of 5 stars

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!

Chase Abbott
Updated 1 month ago by Chase Abbott
5 out of 5 stars

F5 Access and BIG-IP Edge are VPN clients that connect to APM access policies for L3 network connectivity.

Chase Abbott
Updated 1 month ago by Chase Abbott
5 out of 5 stars

F5 BIG-IP APM provides granular access controls to discreet applications and networks supporting 2FA and federated identity management.

Jason Rahm
Updated 2/23/2017 by Jason Rahm
5 out of 5 stars

As I prepped for this password killing journey, I couldn’t get the Fugees “Killing Me Softly” out of my head. Lauryn Hill kills it in that song (pun intended.) So I wrote a little intro you can hum along to the tune…I’ll wait. Feeling my pain...

Brett Smith
Updated 2/7/2017 by Brett Smith
5 out of 5 stars

It’s been a number of years since I penned my first DC article: Two-Factor Authentication using YubiKey, YubiCloud and APM. A lot has changed over the years, BIG-IP versions and features, new YubiKey models and the YubiCloud Validation...

Michael J
Updated 1/5/2017 by Michael J
5 out of 5 stars

BIG-IP iRulesLX FakeADFS - WS-Federation/SAML11

Graham
Updated 12/19/2016 by Graham
5 out of 5 stars

This guide will cover how to use APM as the access gateway in front of Storefront when using Citrix FAS. This will enable you to leverage authentication methods like SAML, Kerberos, or NTLM on the client side. Note that almost any auth method can be supported via Receiver for web, but Receiver self-service does not support some auth methods such as SAML.

Peter Silva
Updated 12/14/2016 by Peter Silva
5 out of 5 stars

IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. In this...

Graham
Updated 12/13/2016 by Graham
5 out of 5 stars

In this article we’ll discuss how to set a variable dynamically. The most common use case is setting something like a role attribute to use in SAML...

John Wagnon
Updated 11/16/2016 by John Wagnon
5 out of 5 stars

If you ever use credit cards for online purchases, you are affected by the Payment Card Industry / Data Security Standards (PCI/DSS). Compliance with these standards are required for any company that processes online payments via credit cards...

Have a APM Question or Discussion Topic?