Integrate F5 BIG-IP Access Policy Manager (APM)

This technical integration guide describes how to integrate a F5 BIG-IP Access Policy Manager (APM) Appliance and Identity as a Service. The aim of this integration is to provide strong, second-factor authentication for your F5 BIG-IP Access Policy Manager (APM) appliance solution using Identity as a Service.

Before you begin, review the following:

Supported authentication methods

VPN capabilities

Prerequisites

Integrate F5 BIG-IP

Complete the following to integrate F5 Big-IP with IDaaS.

Step 1: Configure F5 BIG-IP Access Manager

Complete the following steps, to configure the F5 BIG-IP Access Policy Manager to use the Identity as a Service proxy and enable VPN services.

Step 1.1: Set the IP address to connect to the F5 Big-IP controller

Step 1.2: Set the static IP address to access the F5 BIG-IP management port IP address

Step 1.3: Connect the unit to a management workstation or network

Step 1.4: Run the setup utility to license and provision F5 Big-IP

Step 1.5: Configure the internal and external networks

Step 1.6: Configure Microsoft Active Directory (AD) authentication

Step 2: Configure Identity as a Service on F5 BIG-IP

After you have configured the F5 BIG-IP Appliance for Identity as a Service, you need to configure Identity as a Service on the F5 BIG-IP Appliance.

Step 2.1: Configure Identity as a Service as an AAA client

Step 2.2: Configure Access Policy Manager for remote access

Step 2.3: Configure the logon page for one-step authentication

Step 2.4: Modify F5 Big-IP authentication flows

Step 3: Set the F5 BIG-IP Edge (VPN) client IP

Step 3: Set the F5 BIG-IP Edge (VPN) client IP

Step 4: Add F5 BIG-IP to Identity as a Service

Step 4.1: Add F5 BIG-IP to Identity as a Service

Step 4.2 Protect F5 BIG-IP with a resource rule

Step 5: Test the integration

After you complete the configuration, use a VPN Client or a Web browser to test the integration to ensure that it works correctly.

Step 5.1: Test one-step authentication

Step 5.2: Test two-step authentication

Step 5.3: Test using Entrust push authentication