Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Outlook Web Access is the web interface to the Microsoft Exchange environment, and many customers have secured the portal behind their BIG-IP APM architecture. In looking at the OWA logon page, however, you'll notice that there are a couple extra options than the default APM logon page supports: This article will show you how to add these options to a custom BIG-IP APM logon page, however, it assumes the portal app with SSO is already configured and working. If you need help with that...
F5er Harry Kleinbourg came up with a great solution for monitoring the availability of BIG-IP APM targets not just based on the availability of the virtual service but also on its ability to handle service based on the licensed session limits. Goals The goal of this solution is for BIG-IP GTM to redirect SSL VPN users to an available BIG-IP APM. The BIG-IP APM must be considered down if the number of users reaches the license limit. However, there is not an existing built-in monitor that allow...
articleapmsecuritynewstechtip February 06, 2013 by Joel Moses
  We’ve seen an increasing number of F5 customers who use (and love) APM asking for greater integration with their favorite Mobile Device Management systems, and now the first integration is here. We’re proud to launch this iApp to the DevCentral community, not only as a potentially useful tool in your APM bag of tricks, but also as an example of the ease with which you can use iApps and iRules to add virtually any type of functionality you can dream up to Access Policy Manager...
articleapmsecurityadnnewstechtip December 04, 2012 by Brett
  Introduction What is a YubiKey? The YubiKey is an innovative USB-key that simplifies the process of logging in with strong two factor authentication. With a simple touch on the device, it generates a One-Time Password (OTP) on any computer and platform without any client software needed. How the YubiKey works By touching the integrated button, the YubiKey sends a time-variant, secure login code as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey comp...
Everyone has surely (don’t call me Shirley!) at least been exposed to THE CLOUD by now.  Whether it’s the—I’ll go with interesting—“to the cloud!” commercials or down in the nuts and bolts of hypervisors and programmatic interfaces for automation, the buzz has been around for a while. One of F5’s own, cloud computing expert and blogger extraordinaire (among many other talents) Lori MacVittie, weighs in consistently on the happenings and positi...
Access systems are messy. Wait, let me rephrase that, Poorly planned access systems are messy.  We’ve all seen it happen a thousand times. Someone comes running into the security cave Demanding Admin: “We have a new web property going up and I need to give remote admin access to the team at the north pole! Santa must have access!” Security Monkey: “Ok, does anyone else need access?” Demanding Admin: “Nope, just Santa.. oh and his elves. And maybe the P...
In many small to medium sized companies (and even some fairly large ones), when you need a new piece of software installed on your desktop, you call the IT guy, or put in a trouble ticket, and the IT guy shows up with a DVD or CD, and installs your software. If you’re lucky, he remote controls your PC, and uses a shared network drive to install software to your PC. This works fine for an office of 10 – 50 people. But let’s say you’re a large multinational corporation with 50,000 or 100,000 deskt...
articleapmsecurityadnnewstechtip July 30, 2012 by Seth Cooper
We are currently installing an Edge Gateway in our network and we use RSA Soft Tokens for authentication.  We were looking for the browser plug-in option like there is on the firepass device and couldn't find it.  I have summited an RFE for this but we needed a work around quick.  I have listed the steps below to integrate the browser plug-in into the Edge.  This will work if you are using the "password" field as your token code input.  If you are trying to do 2 factor a...
Early last year I blogged an update to the iRules HTTP event order that F5er John Alam put together. John is back with another update to the drawing, this time, however, including the access policy manager flow. This article will cover the APM events as well as a couple new standard events added back in 11.0. APM Event Flow There are eight events specific to the access policy manager in iRules, as well as a dozen or so commands. I’ll focus on the events in this article. Of the eight events, th...
articleapmsecuritynewstechtip February 27, 2012 by Jason Rahm
Last fall I released a series of articles on configuring APM for remote desktop access: Part 1 Part 2 Part 3 These are great starter articles into the power that APM offers in presenting a user with a method to get to their desktop. But if the user just needs to get to the file system for a file, or check mail via OWA, launching the desktop is a little much.  In part one (of two) of this series, I’ll expand on the function of the webtop to include web portals and network...
Page 1 of 3First   Previous   [1]  2  3  Next   Last