It’s authentication, people! Only, wait for it….STRONGER (yes i did use the strong html tag for that.) Strong authentication is a nebulous term. Many will interchange strong authentication with two-factor authentication (2FA), but that is only one method for strong authentication, not necessarily a requirement. You could have a series of “something you know” challenges that makes the authentication process more in depth and thus stronger, but doesn’t require one or more of the other multi-factor pillars in “something you have” or “something you are."

So what strong authentication solutions does F5 support?  The Access Policy Manager actually shines here, because it is vendor agnostic.  You can plug and play a myriad of authentication systems into the process and off you go. Some of the different authentication methods include:

  • LDAP/S
  • HTTP/S
  • RADIUS
  • TACACS+
If your authentication services can talk one or more of these protocols, APM will support it.

We’ve posted solutions on DevCentral with Google Authenticator (LTM via ldap and APM,) Yubico Yubikey (LTM and APM,) as well as RSA SecurID over the years. There are some nuanced differences between all the solutions, but this diagram from Brett Smith’s APM and Yubikey article linked previously shows the general process for APM’s support of multi-factor authentication.

Yubikey 2-Factor Authentication

This directory server could be Active Directory, LDAP, or RADIUS to a cloud service like SafeNet’s Authentication Services as discussed in this solution brief. Beyond just authenticating local services, these strong authentication services can be utilized with federation as well, using APM’s SAML support for SP and iDP deployments. SafeNet has quality write-ups for their APM-integrated enterprise and cloud iDP strong authentication services available on their site. For more information about how these authentication services plug in to the larger SAML federation services, take a look at John’s lightboard Lesson on the topic.

Additional Resources