Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Google reCAPTCHA Verification With Sideband Connections

Introduction Virtually every dynamic site on the Internet these days makes use of a CAPTCHA in some fashion. A CAPTCHA is used to verify that a human is driving the interaction with a particular  function on a site. A CAPTCHA in its simples... Read more
0 Reviews

Two-Factor Authentication With Google Authenticator And LDAP

Introduction Earlier this year Google released their time-based one-time password (TOTP) solution named Google Authenticator. A TOTP is a single-use code with a finite lifetime that can be calculated by two parties (client and server) using ... Read more
Average Rating: 4.4
5 Reviews

Web Application Login Integration with APM

As we hurtle forward through the information age we continue to find ourselves increasingly dependant on the applications upon which we rely. Whether it's your favorite iPhone app or the tools that allow you to do your job, the application... Read more
1 Review

One Time Passwords via an SMS Gateway with BIG-IP Access Policy Manager

One time passwords, or OTP, are used (as the name indicates) for a single session or transaction.  The plus side is a more secure deployment, the downside is two-fold—first, most solutions involve a token system, which is costly i... Read more
Average Rating: 4.9
7 Reviews

HTTP Basic Access Authentication iRule Style

I started working on an administrator control panel for my previous Small URL Generator Tech Tip (part 1 and part 2) and realized that we probably didn’t want to make our Small URL statistics and controls viewable by everyone. That led me to make... Read more
Average Rating: 4.9
9 Reviews

Unbind your LDAP servers with iRules

LDAP is one of the most widely used authentication protocols around today. There are plenty of others, but LDAP is undeniably one of the big ones. It comes as no surprise then that we often hear different questions about using F5 technology with... Read more
2 Reviews

Can iRules fix my cert mismatch errors?

SSL encryption as a means of security on the web isn't a new concept. We've talked about it here on DevCentral many times, and it's as pedestrian a concept as a corndog on the boardwalk to most internet users. We've talked about... Read more
0 Reviews

Selective Client Cert Authentication

SSL encryption on the web is not a new concept to the general population of the internet. Those of us that frequent many websites per week (day, hour, minute, etc.) are quite used to making use of SSL encryption for security purposes. It's an... Read more
1 Review

RADIUS Load Balancing with iRules

What is RADIUS? “Remote Authentication Dial In User Service” or RADIUS is a very mature and widely implemented protocol for exchanging ”Triple A” or “Authentication, Authorization and Accounting” information. RADIUS is a relatively simple,... Read more
1 Review

Radius Aware Load Balancing via iRules

RADIUS is very popular authentication method that is being widely used in amongst some of the top service providers around the world, not to mention in deployments ranging from enterprise corporate environments to clustered mail systems and back.... Read more
0 Reviews

Conditioning iRule Logic on External Information - #01 - HTTP::retry

Customers frequently ask if they can condition their iRule logic on information retrieved real-time from an external source.  In most cases, you really can't. Most external calls are blocked If an external call were to take place inside... Read more
0 Reviews

iRule Security 101 - #05 - Avoiding Path Traversal

Path Traversal is an attempt to access files and/or directories stored outside web root folder. If successful this could allow malicious users to view content they were not intended to see, execute programs that have lax permissions and were... Read more
0 Reviews

iRule Maintenance Windows

A fun, but not well known, feature on BIG-IP is the Statistics Profile. This tech tip is the second in a series on how the Statistics Profile and iRules, when working together, can save time, productivity, and your sleep! The Scenario: Imagine... Read more
Average Rating: 4.9
3 Reviews

Offload Authentication with iRules

As the applications being driven by webservers become more and more complex, Applications Developers are always looking for ways to increase efficiency or do away with unneeded processing time. One of the ways that I believe that Applications can... Read more
1 Review

Requiring an SSL Certificate for Parts of an Application

When building many enterprise web-based applications, security must be taken seriously. iRules provide powerful capabilities for influencing security decisions when processing for your web services and applications. This is a rule for requiring a... Read more
0 Reviews