Lab 2.2 - Create an Access Security Policy

Creating a security policy with authentication to Azure and Kerberos Single Sign-On

  1. Access BIG-IP Next Central Manager if you’re not already logged in.
../../_images/lab2-cmlogin1.png
  1. Click on the Workspace icon and select Security
../../_images/lab2-securitybtn.png

Click on the Access from the Security menu.

../../_images/lab2-accessbtn.png
  1. Click the Start Creating button to create a new Access policy, or the create button on top right corner.
../../_images/lab2-createapbtn.png
  1. This will open Access Visual Policy Design screen. Select Per-Session and using a policy template. Select template SAML as Service Provider
../../_images/lab2-selecttemplate.png
  1. In the Create Per-Session Policy screen, this is where you set the different properties of the policy, such as, logging, language, Single Sign On, etc… Let’s start configuring the policy by setting a policy name and policy parameters.

In the General Properties screen set the following parameters, for the rest of the settings you may leave it as default.

  • Policy Name: signed_azure_policy
  • Click Continue

Note

As you continue the rest of the policy creation process, see the screen shot in each section for a visual example of the configuration.

../../_images/lab2-azurepolicy.png
  1. In Session Properties, keep the default settings, click Continue
../../_images/lab2-session.png
  1. In the Logging screen, you may want to adjust the logging to debug for troubleshooting proposes. For this lab we will keep all the default settings.
../../_images/lab2-logging.png
  1. In the Single Sign-On screen, is where you can configure Single Sign-On to your applications. In this lab we will setup Single Sign-On for Kerberos.

Click on the drop-down arrow on the Start Creating button and select Kerberos.

../../_images/lab2-sso.png
  1. This will open the SSO Method Configuration screen. In this screen set the parameters as follow.
  • Name: remove the trailing number and replace with signed_azure_policy. See image below as reference.
  • Kerberos Realm: F5ACCESS.ONMICROSOFT.COM
  • KDC: 10.1.20.6
  • Account Name: host/apm-deleg.f5access.onmicrosoft.com
  • Account Password: F5twister$
  • SPN Pattern: HTTP/%h@F5ACCESS.ONMICROSOFT.COM
  • Username Source: session.saml.last.identity
  • User Realm Source: session.logon.last.domain
../../_images/lab2-sso2.png
  1. Click Continue, this will take you back to the Policy Configurations screen. Click Continue on the next screen.
  2. Endpoint Security screen, you can setup Endpoint Security such as ensuring the firewall is enabled on a client workstation before access is granted. In this lab, we will not use this feature. Click Continue.
  3. Resources screen, you can set additional capabilities and features such as Network Access, and Webtops in this screen. In this lab we will not use these capabilities. Click Continue.
  4. Connectivity you can set the SSL VPN (Network Access) connectivity settings. Keep as default and click Continue
  5. Policy Endings, you can define addition policy ending logic as needed for your use case here. In this lab we will accept the default. Click Finish.
  6. After clicking on Finish it should bring you back to the Create Policy screen. Now, we will use the Visual Policy Designer (VPD) to continue building the policy.

In Next Access we have two terms in the Visual Policy Designer (VPD); Flows and Rules. We set the Flows in the Visual Policy Designer (VPD) and within each Flow we can define multiple Rules.

../../_images/lab2-vpd-flow.png
  1. As we use a template, the flow is already there. We must configure it now.
  2. Click on the Collapse button to see the content of the flow. You can see 2 rules.
../../_images/lab2-flowrules.png
  1. Edit inside the SAML-Federation Rule box
../../_images/lab2-edit-saml.png

This will open the SAML Federation Rule properties screen. Please follow the images below for each section.

  1. In the SAML Rule Properties configuration, replace the trailing number in the Name field to azure_signed_policy. Leave the Provider Configuration as Basic. Click Continue.
../../_images/lab2-ruleprop1.png
  1. In the Rule Configuration, Providers screen, this is where you can configure Service Provider and Identity Provider. A generic SP is already set. Edit it
../../_images/lab2-serviceprovider.png
  1. Click on Start Creating under Identity Provider. In the Add Identity Provider screen input the following information, and then click Save.
../../_images/lab2-identityprovider.png
  1. After you click Save this should take you back to the Rule Configuration Screen, click Continue.
  2. In the Branches screen, keep the default. Click Finish.
  3. Save the policy and close the VPD by clicking on Exit.

You have completed creating an security policy!