The ACCESS namespace deals with commands and events for the APM module.
Please note: ACCESS iRule commands are not supported in API Protection use cases.
- ACCESS::acl - Poll or enforce ACLs in your connections
- ACCESS::disable - Control enforcement for a particular request URI
- ACCESS::enable - enables the access control enforcement for a particular request URI
- ACCESS::ephemeral-auth - used either to create or verify a temporary password for ephemeral authentication
- ACCESS::flowid - set/get the flow id for SSL Orchestrator using APM logging framework
- ACCESS::log - logs a message using APM logging framework
- ACCESS::oauth - returns a JSON Web Signature token
- ACCESS::perflow - String of perflow variable; empty if value isn’t set
- ACCESS::policy - Return information about access policies
- ACCESS::respond - This command generates new respond and automatically overrides the default respond.
- ACCESS::restrict_irule_events - Enable or disable HTTP and higher layer iRule events for the internal APM access control URIs
- ACCESS::saml - allows you to retrieve or manipulate SAML related messages
- ACCESS::session - Access or manipulate session information.
- ACCESS::user - Returns user ID information
- ACCESS::uuid - enumerates the session IDs that belongs to a specified uuid key by the order of its creation and provides them in a Tcl list
- ACCESS2::access2_proc - return the TCL procedure registered for currently executing per-request policy expression.
- ACCESS_ACL_ALLOWED - This event is triggered when a resource request passes the access control criteria and is allowed to go through the ACCESS filter. This event is only triggered for the resource requests and …
- ACCESS_ACL_DENIED - This event is triggered when a resource request fails to meet the access control criteria and is denied access.
- ACCESS_PER_REQUEST_AGENT_EVENT - allows admin to execute an iRule logic (inside TMM) at a desired point in the per-request access policy execution
- ACCESS_POLICY_AGENT_EVENT - This event provides glue between iRule execution and access policy execution.
- ACCESS_POLICY_COMPLETED - This event is triggered when the access policy execution completes for a user session.
- ACCESS_SAML_ASSERTION - triggered when the SAML assertion payload is generated for a user session.
- ACCESS_SAML_AUTHN - triggered when the SAML authentication request payload is generated for a user session.
- ACCESS_SAML_SLO_REQ - triggered when the SAML single logout request payload is generated for a user session.
- ACCESS_SAML_SLO_RESP - triggered when the SAML single logout response payload is generated for a user session
- ACCESS_SESSION_CLOSED - This event is triggered when a user session is removed due to a user logging out explicitly. timeout or if terminated explicitly by admin.
- ACCESS_SESSION_STARTED - This event is triggered when a new user session is created. This is triggered after creating the session context and initial session variables related to user’s source IP. browser capabiliti…
- ACCESS2_POLICY_EXPRESSION_EVAL - triggered when per-request policy branch expressions are evaluated
The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.