Dynamically open firewall rules based upon user authenticated sessions using iRules LX
5 trips to get your started with iRules LX
If you’ve ever had the pleasure to hear me rant on web access management then you know I like to stress the difference between authentication and authorization. Authentication is the process of verifying a user’s identity while authorization is the process of determining the level of access the user possesses for any given application and/or […]
Over on DevCentral Robert Haynes has posted a great article outlining the advantages of F5’s clustered multiprocessing (CMP) architecture versus traditional shared memory architecture. So why does this matter? Because attacks today are designed to stress the performance of security devices and bring them to their knees. If your architecture is designed correctly then it […]
I posted a new series on DevCentral regarding ways F5’s Access Policy Manager can facility authenticating users from multiple domain sources. This post is part 1 of 4 and the series will cover some cool topics like home realm discovery and automatic domain detection.