Lab 3.5 - Identity Aware Proxy

BIG-IP Next Access can provide an Identity Aware Proxy, a proxy that requires authentication before a resource can be accessed.

In this exercise we will explore the existing “signed.example.com” that is using Okta and Azure AD for restricting access to an application.

Lab 3.5.1 Open Firefox

Now we will verify our application is deployed with DNS

  1. Within your UDF Deployment, go to the Firefox access method that is under the Ubuntu Jump Host

    This will open an embedded Firefox browser session that is running inside the lab environment.

    ../../_images/access-method-firefox.png
  2. Inside the Firefox browser session go to https://signed.example.com

  3. Login user username: user1@f5access.onmicrosoft.com and password user1

    ../../_images/okta-login.png
  4. You should now be logged in

    ../../_images/signed-example-logged-in.png
  5. In Central Manager Navigate to Security

    Navigate to Security by clicking the workspace switcher next to the F5 icon

    ../../_images/top-left.png

    Then click on Security

    ../../_images/central-manager-menu-security.png
  6. Click on “Access Dashboard”

    You will see your session

    ../../_images/access-dashboard.png

    Note

    Due to single sign on with Okta if you remove your session you will still be logged in. An example that uses a different authentication type would cause your session to end after you remove the session.