Access Policy Manager(APM) Solution Guides¶
The solutions documented on this site are designed to provide example configurations to address a given scenario.
Each solution has an accompanying guide that provides a detailed overview of the components used in the configuration and the workflow used in Visual Policy Editor.
To deploy a solution you must be logged into UDF (https://udf.f5.com). From there you need to access the Access Labs and Solution Blueprint/Course. F5ers can access the blueprint directly from UDF without launching a course. If you are a partner or customer please reach out to your account team. They will be able to create a course for you to access the environment.
Proceed to the “Environment” Section to learn about the components in the blueprint and how to deploy solutions.
If a given topic is not highlighted currently on this page or something is incorrectly documented, please open an issue on the Access Solutions repo (https://github.com/f5devcentral/access-solutions/issues). We will do our best to prioritize the development of the content based on demand.
If you would like to contribute, templates are also available for download from the templates folder in the repo.
Solutions¶
- Getting to Know the Environment
- Solution1: VPN (AD Auth)
- Solution2: Portal Rewrite & VPN (AD Auth)
- Solution3: SAML SP (Okta IDP)
- Solution4: SAML IDP (AD Auth)
- Solution5: SAML SP (BIG-IP IDP)
- Solution6: LTM & APM - Client Certificate to Single Domain kerberos SSO
- Solution7: Inline SAML with Kerberos sideband
- Solution8: JWT AS using preshared keys (AD Auth)
- Solution9: JWT RS using preshared key (BIG-IP AS)
- Solution10: OIDC IdP/AS using public keys (AD Auth)
- Solution11: OIDC Client using Public Keys (BIG-IP IdP)
- Solution12: RDP Gateway (AD Auth)
- Solution13: API Protection using Public Keys (BIG-IP AS)
- Solution14: Per-Request Policy using Azure AD SAML IdP
- Solution15: IdP Chaining to AzureAD using Per-Request Policy
- Solution16: SAML SP with AzureAD IdP to Kerberos SSO