Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Access Policy Manager (APM)

APM is a flexible, high-performance access and security solution that lets you control who can access your network and data. By consolidating remote access, LAN access, web access, and wireless connections into a single management interface, you free up IT resources while you effectively secure and scale access.

Learn more

Articles

Cody Green
Updated 3 weeks ago by Cody Green
5 out of 5 stars

A post discussing the burdens of federated authentication - specifically authentication vs authorization.

Peter Silva
Updated 1 month ago by Peter Silva

As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers,...

Greg Coward
Updated 1 month ago by Greg Coward

One of the most interesting parts of my job is answering questions.  Mind you, these questions aren’t the usual meaningless ones like, “Hey Greg, is a Roth IRA right for me?” or “What’s the meaning of life?”.  Oh no, no , no; we’re...

Peter Silva
Updated 3 months ago by Peter Silva

Recently I changed some of my passwords. Some due to typical rotation time and a couple due to potential breaches and encouragement from the affected site. No, I’m not going to tell you which ones or how I go about it but I noticed that it took...

Jason Rahm
Updated 3 months ago by Jason Rahm
5 out of 5 stars

It’s authentication, people! Only, wait for it….STRONGER (yes i did use the strong html tag for that.) Strong authentication is a nebulous term. Many will interchange strong authentication with two-factor authentication (2FA), but that is only one...

Peter Silva
Updated 3 months ago by Peter Silva

There once was a time when organizations wouldn’t consider deploying critical applications in the cloud. It was too much of a business risk from both an access and an attack perspective—and for good reason, since 28 percent of enterprises have...

Seth Cooper
Updated 4 months ago by Seth Cooper

In a previous article I wrote about selecting multiple network access resources when using the Edge Client. (https://devcentral.f5.com/articles/select-between-multiple-network-access-resources-with-the-edge-client) The previous article was...

Lucas Thompson
Updated 4 months ago by Lucas Thompson

BIG-IP APM to cease support of Windows 8 in March 1, 2016

Peter Silva
Updated 4 months ago by Peter Silva
5 out of 5 stars

For nearly 12 years at F5, I've had only two job titles - Security Systems Architect from 2004-06 and Technical Marketing Manager since 2006. Whenever anyone asks what I do at F5, I typically answer, 'Writer, speaker and video...

す~さん
Updated 4 months ago by す~さん
5 out of 5 stars

Technorati タグ: APM,BIG-IP,iRules   SSLVPN利用基盤の構築においてクライアント証明書を用いずにデバイスの制限を簡易な運用で実現できる仕組みを検討されており、下記のような要件があったとします...

Cody Green
Updated 3 weeks ago by Cody Green
5 out of 5 stars

A post discussing the burdens of federated authentication - specifically authentication vs authorization.

Jason Rahm
Updated 3 months ago by Jason Rahm
5 out of 5 stars

It’s authentication, people! Only, wait for it….STRONGER (yes i did use the strong html tag for that.) Strong authentication is a nebulous term. Many will interchange strong authentication with two-factor authentication (2FA), but that is only one...

Peter Silva
Updated 4 months ago by Peter Silva
5 out of 5 stars

For nearly 12 years at F5, I've had only two job titles - Security Systems Architect from 2004-06 and Technical Marketing Manager since 2006. Whenever anyone asks what I do at F5, I typically answer, 'Writer, speaker and video...

す~さん
Updated 4 months ago by す~さん
5 out of 5 stars

Technorati タグ: APM,BIG-IP,iRules   SSLVPN利用基盤の構築においてクライアント証明書を用いずにデバイスの制限を簡易な運用で実現できる仕組みを検討されており、下記のような要件があったとします...

Daphne Won (F5)
Updated 5 months ago by Daphne Won (F5)
5 out of 5 stars

Upcoming Engineering Hotfixes for BIG-IP Access Policy Manager to address interruptions brought by new plug-in signing requirements in Firefox Browser versions 43 and 44

Justin Venezia
Updated 5 months ago by Justin Venezia
5 out of 5 stars

VMware’s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet connection. Typically, the Security Server/Access Point is placed within an organization’s DMZ. F5 BIG-IP Access Policy...

Robert Teller
Updated 5 months ago by Robert Teller
5 out of 5 stars

Technical Challenge Recently I was speaking with a customer and they mentioned that they leveraged the “Max Sessions Per User” setting within BIG-IP APM Access Profile to limit the number of concurrent connections that a single user could have...

Jay Kelley
Updated 5 months ago by Jay Kelley
5 out of 5 stars

Third-party browser plug-ins such as Java and Flash, as well as certain third-party malicious plugins, have been successful targets of browser-based security attacks and vulnerabilities. Browser vendors are eager to close loopholes allowing control of page content and computer operation outside of browser context. To mitigate these concerns, F5 will soon end the use of browser plug-ins.

John Wagnon
Updated 12/9/2015 by John Wagnon
4 out of 5 stars

The Security Assertion Markup Language (SAML) allows you to simplify access control and management of your applications. Once upon a time, you would need a separate username/password database for each application you hosted. Now, with the use of SAML, you can consolidate everything into one place and reduce the management and security headache of it all...

Greg Coward
Updated 11/12/2015 by Greg Coward
5 out of 5 stars

Why yes, I am and It’s true!  F5 is now in the Azure Marketplace.  Now enterprises can make use of the same services, features, and functionality up in the Azure cloud as they have for years. So step right up and be the first kid on your...

Have a APM Question or Discussion Topic?