apm profile accessΒΆ

apm profile access(1)					BIG-IP TMSH Manual				     apm profile access(1)

NAME
       access - Configures an access profile.

MODULE
       apm profile

SYNTAX
       Configure the access component within the profile module using the syntax shown in the following sections.

   CREATE/MODIFY
	create access [name]
	  options:
	    accept-languages [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    access-policy [[string] | none]
	    access-policy-timeout [integer]
	    app-service [[string] | none]
	    cache-generation [integer]
	    customization-group [[string] | none]
	    default-language [[string] | none]
	    defaults-from [[string] | none]
	    domain-cookie [[string] | none]
	    domain-groups [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    domain-mode [single-domain | multi-domain]
	    user-identity-method [http | ip-address]
	    enforce-policy [true | false]
	    eps-group [[string] | none]
	    errormap-group [[string] | none]
	    framework-installation-group [[string] | none]
	    general-ui-group [[string] | none]
	    generation-action [increment | noop]
	    httponly-cookie [true | false]
	    inactivity-timeout [integer]
	    logout-uri-include [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    logout-uri-timeout [integer]
	    log-settings [add | delete | modify | replace-all-with] {
	       [name]
	    }
	    max-concurrent-sessions [[integer] | none]
	    max-concurrent-users [[integer] | none]
	    max-failure-delay [integer]
	    max-in-progress-sessions [[integer] | none]
	    max-session-timeout [integer]
	    min-failure-delay [integer]
	    oauth-profile [[oauth-profile-name] | none]
	    persistent-cookie [true | false]
	    primary-auth-service [[string] | none]
	    restrict-to-single-client-ip [true | false]
	    sandboxes [add | delete | modify | replace-all-with] {
	      [name] { retain-public-access [true|false] }
	    }
	    scope [profile | virtual-server | global | named | public]
	    named-scope [[string] | none]
	    secure-cookie [true | false]
	    sso-name [[string] | none]
	    type [all | identity-service | ltm-apm | oauth-resource-server | rdg-rap | ssl-vpn | sso | swg-explicit | swg-transparent | system-authentication]
	    use-http-503-on-error [true | false]

	modify access [name]
	  options:
	    accept-languages [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    access-policy [[string] | none]
	    access-policy-timeout [integer]
	    app-service [[string] | none]
	    cache-generation [integer]
	    customization-group [[string] | none]
	    default-language [[string] | none]
	    defaults-from [[string] | none]
	    domain-cookie [[string] | none]
	    domain-groups [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    domain-mode [single-domain | multi-domain]
	    user-identity-method [http | ip-address]
	    enforce-policy [true | false]
	    eps-group [[string] | none]
	    errormap-group [[string] | none]
	    framework-installation-group [[string] | none]
	    general-ui-group [[string] | none]
	    generation-action [increment | noop]
	    httponly-cookie [true | false]
	    inactivity-timeout [integer]
	    logout-uri-include [add | delete | modify | replace-all-with] {
	      [name]
	    }
	    logout-uri-timeout [integer]
	    log-settings [add | delete | modify | replace-all-with] {
	       [name]
	    }
	    max-concurrent-sessions [[integer] | none]
	    max-concurrent-users [[integer] | none]
	    max-failure-delay [integer]
	    max-in-progress-sessions [[integer] | none]
	    max-session-timeout [integer]
	    min-failure-delay [integer]
	    oauth-profile [[oauth-profile-name] | none]
	    persistent-cookie [true | false]
	    primary-auth-service [[string] | none]
	    restrict-to-single-client-ip [true | false]
	    sandboxes [add | delete | modify | replace-all-with] {
	      [name] { retain-public-access [true|false] }
	    }
	    scope [profile | virtual-server | global | named | public]
	    named-scope [[string] | none]
	    secure-cookie [true | false]
	    sso-name [[string] | none]
	    use-http-503-on-error [true | false]
	 edit access [ [ [name] | [glob] | [regex] ] ... ]
	   options:
	     all-properties
	     non-default-properties

   DISPLAY
	list access
	list access [ [ [name] | [glob] | [regex] ] ... ]
	show running-config access
	show running-config access [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    partition

	show access
	show access [name]

   DELETE
	delete access [name]

DESCRIPTION
       You can use the access component to configure an access profile. An access profile is a pre-configured group of settings
       that you can use to configure secure Network Access for an application.

EXAMPLES
       create access MyAccessProfile { defaults-from access access-policy "my_access_policy" accepted-languages
       "my_accepted_languages" default-language "en" customization-group "company_logout" eps-group 'myepsgroup' framework-
       installation-group "company_header" "company_footer" errormap-group "company_errormap" }
	    Creates an access profile named MyAccessProfile that is based on the default access profile named access, uses the
	    access policy named my_access-policy, accepts the languages in the my_accepted_languages class, uses English as the
	    default language, and uses these groups to customize the application pages and messages: company_logout,
	    company_header, company_footer, and company_errormap.

       list access all all-properties
	    Displays a list of access profiles, including parameter values.

       delete access MyAccessProfile
	    Deletes the access profile named MyAccessProfile.

OPTIONS
       accept-languages
	    Specifies the name of a class that defines the languages supported by the access profile. The default languages are en
	    (English), ja (Japanese), zh-cn (simplified Chinese (PRC)), and zh tw (traditional Chinese (Taiwan)). This option is
	    required.

       access-policy
	    Specifies the access policy that you want to enforce using this access profile. An access policy contains various
	    security checks that a client must pass before the BIG-IP Access Policy Manager grants access to a protected
	    application. This option is required.

       access-policy-timeout
	    Specifies, for this access profile, the number of seconds within which a user must complete the steps to gain access
	    to an application. The default is 300 seconds. This option is designed to quickly release session resources when a
	    user does not complete the access process, for example, when the user closes the browser before completing the access
	    process.

       app-service
	    Specifies the name of the application service to which the object belongs. The default value is none. Note: If the
	    strict-updates option is enabled on the application service that owns the object, you cannot modify or delete the
	    object. Only the application service can modify or delete the object.

       customization-group
	    Specifies the customization group that defines the appearance of the logout and error pages. This option is required.

       default-language
	    Specifies the default language for the BIG-IP Access Policy Manager that you want to implement with this access
	    profile. The default is en (English). If the client requests a language that is not supported, the BIG-IP Access
	    Policy Manager uses the default value. This option is required.

       defaults-from
	    Specifies the default access policy from which this profile is created. This option is required.

       domain-cookie
	    Specifies a domain cookie to use with an application access control connection. If you specify a domain cookie, then
	    the line domain=specified_domain is added to the MRHsession cookie. The default is none.

       domain-groups
	    Specifies a group of multiple domains or multiple hosts in multiple domains to which a single user session has access.
	    For example, you can use this option to configure a single user session to have access to three domains: www.a.com,
	    www.b.com, and www.c.com. When a user logs in to any of these domains, that user can access the other domains without
	    logging in again. This option is required when you set the domain-mode option to multi-domain. This option is ignored
	    when you set the access domain-mode option to single-domain.

	    For each domain in the domain group, you can specify the following settings:

	    cookie-host
		 Specifies the host name for which to create the user's session cookie.

	    cookie-domain
		 Specifies the domain for which to create the user's session cookie.

	    secure-cookie
		 Adds a security attribute to the user's session cookie.

	    persistent-cookie
		 Adds a persistence attribute to the user's session.

	    sso-name
		 Specifies the SSO method to use when accessing a backend application.

       domain-mode
	    Specifies how the SSO configuration is applied. The options are:

	    single-domain
		 Applies the SSO configuration to a single domain. This is the default.

		 When you set domain-mode to single-domain, you must also set the sso-name option.

	    multi-domain
		 Applies the SSO configuration across multiple domains. This option allows users a single APM login/session and
		 applies the credentials across multiple Local Traffic Manager or Access Policy Manager virtual servers in front
		 of different domains. Note that to apply SSO configurations across multiple domains, all virtual servers must be
		 on one BIG-IP system.

		 When you set domain-mode to multi-domain, you must also configure the domain-group option, and provide a URI for
		 the primary-auth-service option.

       user-identity-method
	    Specifies how access will bind a session to a request.

	    http Use http information such as cookies and URI query string to identify user.

	    ip-address
		 Use IP address to identify a user. Do not use this setting if clients may be behind a NAT.

       enforce-policy
	    Set this option to false, if you don't want to enforce the access-policy. The default is true which means the access-
	    policy is always enforced. This option can only be modified for SWG-Transparent type profile.

       eps-group
	    This option is required.

       errormap-group
	    Specifies the customization settings for the error map that you want to implement with this access profile.  This
	    setting is required.

       framework-installation-group
	    Specifies the customization settings for the header and footer that you want to implement with this access profile.
	    This setting is required.

       generation-ui-group
	    Specifies the generation of the user interface group for the new generation access configuration. This option is
	    required.

       generation-timeout
	    Specifies the timeout, in seconds, for the new generation access configuration.

       generation-action
	    increment
		 Activates the current access policy configuration for an access profile. For example, the following command
		 activates current access policy configuration for profile myAccessProfile: tmsh modify apm profile access
		 myAccessProfile generation-action increment

	    noop Specifies "no operation to be performed". This is the default.

	    sync Specifies that the policy is being modified due to APM policy sync operation. This is an internal action; you
		 should not set it.

       httponly-cookie
	    Specifies whether HttpOnly directive should be inserted in HTTP response from BIG-IP. The client browser should
	    prevent script from accessing cookie, if this flag is set in the response. The default is false.

       inactivity-timeout
	    Specifies, for this access profile, the number of seconds that the session on the client can be idle before the server
	    disconnects the VPN tunnel. The default is 900 seconds.

       logout-uri-include
	    Specifies a list of URIs to include in the access profile for initiating session logout.

       logout-uri-timeout
	    Specifies the timeout used to delay logout for the customized logout URIs defined in the logout uri include list

       log-settings
	    Specifies one or more log-setting containers to associate with this profile

       max-concurrent-sessions
	    Specifies, for this access profile, the number of concurrent sessions allowed. The default is 0 (zero), which
	    represents unlimited sessions. Users assigned an administrative role of Application Editor can view the value of this
	    option. Users assigned any other administrative role can modify this option.

       max-concurrent-users
	    Specifies, for this access profile, the number of concurrent sessions allowed. The default is 0 (zero), which
	    represents unlimited sessions. This field is Read-only for Application Editors. Users assigned any other
	    administrative role can modify this field.

       max-failure-delay
	    Specifies the maximum random delay after authentication failure during the access policy. It is the maximum number of
	    seconds before the user is shown an error message on the logon page and prompted to re-enter credentials. The default
	    is 5 seconds. 0 (zero) represents no delay. Note: Set max-failure-delay to no more than one-half the access-policy-
	    timeout value and no more than 65 seconds greater than min-failure-delay.

       max-in-progress-sessions
	    Specifies the maximum number of in-progress concurrent sessions a user can have. The in-progress sessions are the
	    sessions for which an access policy has not completed. The default is 0, which represents an unlimited number of such
	    sessions.

       max-session-timeout
	    Specifies the maximum lifetime of one session. The maximum lifetime is the number of seconds between session creation
	    and session termination.

       min-failure-delay
	    Specifies the minimum random delay after authentication failure during the access policy. It is the minimum number of
	    seconds before the user is prompted for credentials again or shown an error message on the logon page. The default is
	    2 seconds.

       [name]
	    Specifies the name of the access profile. This option is required.

       oauth-profile
	    Specifies an oauth profile for use with an OAuth Authorization Server.

       persistent-cookie
	    Specifies to retain the cookie for a user session, even when the user session is terminated, when set to true.
	    Although this is an insecure method, this setting is useful and required in cases where you have a third-party
	    application, such as Sharepoint, and need to store the cookie in a local database so that any attempt to access
	    backend server applications through Access Policy Manager succeeds. The default is false.

       primary-auth-service
	    Specifies the address of your primary authentication URI. This setting is required when you set the domain-mode option
	    to multi-domain.

	    For example, when you set this option to https://logon.yourcompany.com, the user session is stored on this primary
	    domain, and the user can access multiple backend applications from multiple domains and hosts without re-entering
	    credentials.

       restrict-to-single-client-ip
	    Specifies whether a user session is tied to a single client IP. If during session's lifetime, the user's client IP
	    address changes, the current session is terminated. The user needs to re-login to create a new session from the new
	    client IP address. The default is false.

       sandboxes
	    Specifies the association between the access profile and the sandbox. If retain-public-access is set to true, this
	    association is retained even if there is no resource that uses sandbox files in the access policy that corresponds to
	    this access profile.

       scope
	    Specifies the confining scope for sessions created by the profile. Set this option to profile (which is also the
	    default-value) to confine the validity of a session to the profile from which it was created. Set this option to
	    virtual-server to further confine the validity of a session to the virtual server from which it was created. Setting
	    this option to global allows the session to be valid on any virtual server with any access profile that also specifies
	    global scope. Setting this option to named allows the session to be valid for any virtual server with access profile
	    using the same named-scope value. The option public is allowed for only SSLO access profiles and sessions aren't
	    created.

       named-scope
	    Specifies the string to which the validity of a session is confined to. This setting is required when you set the
	    scope option to named.

       secure-cookie
	    Set this option to true, if you want to add a secure keyword to the session cookie. Set this option to false, if you
	    want to configure an application access control scenario that uses an HTTPS virtual server to authenticate the user,
	    and then sends the user to an existing HTTP virtual server to use applications. The default is true.

       sso-name
	    Specifies the SSO configuration that you want BIG-IP Access Policy Manager to use to submit the user's credentials to
	    the backend application. This allows the user to log in once to the Access Policy Manager and then gain access to
	    backend applications without logging in again.

       type Specifies the type of access profile. You can specify the following types for an access profile.

	    all  Supports ltm-apm and ssl-vpn access types.

	    identity-service
		 Used internally to provide identity service for a supported integration. Only APM creates this type of profile.

	    ltm-apm
		 For web access management configuration.

	    oauth-resource-server
		 Supports apps and devices that use OAuth tokens but do not support cookies.

	    rdg-rap
		 For validating connections to hosts behind APM when APM acts as a gateway for RDP clients.

	    ssl-vpn
		 For network access, portal access, or application access.

	    sso  For configuring matching virtual servers for Single Sign-On (SSO).

	    swg-explicit
		 For Secure Web Gateway explicit forward proxy.

	    swg-transparent
		 For Secure Web Gateway transparent forward proxy.

	    system-authentication
		 For configuring administrator access to the BIG-IP system (when using APM as a pluggable authentication module).

       use-http-503-on-error
	    Set this option to true to use HTTP response code 503 for error pages sent by BIG-IP Access Policy Manager to clients.
	    Set this option to false to use HTTP response code 200. The default is false.

SEE ALSO
       apm sso, apm policy

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
       photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal
       use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2011-2013, 2015-2016. All rights reserved.

BIG-IP							    2019-02-10					     apm profile access(1)