SlideShare a Scribd company logo
1 of 39
CONFIDENTIAL
MANAGING USER ACCESS
Tzoori Tamam
tzoori@f5.com
BIG-IP Local Traffic Manager
+ Access Policy Manager
Directory
SharePoint OWA
Cloud
Web servers
App 1 App n
APP
OS
APP
OS
APP
OS
APP
OS
Hosted virtual
desktop
Users
ENABLE SIMPLIFIED APPLICATION ACCESS
with BIG-IP Access Policy Manager (APM)
BIG-IP® APM features:
• Centralizes single sign-on and access control services
• Full proxy L4 – L7 access control at BIG-IP speeds
• Adds endpoint inspection to the access policy
• Visual Policy Editor (VPE) provides policy-based access control
• VPE Rules—programmatic interface for custom access policies
• Supports IPv6
BIG-IP® APM ROI benefits:
• Scales to 100K users on a single device
• Consolidates auth. infrastructure
• Simplifies remote, web and application access
control
*AAA = Authentication, authorization and accounting (or auditing)
BIG-IP Access Policy Manager (APM)
Unified access and control for BIG-IP
Control Access of Endpoints
Ensure strong endpoint security
Users
BIG-IP APM
• Antivirus software version
and updates
• Software firewall status
• Machine certificate validation
Allow, deny or remediate users based
on endpoint attributes such as:
Invoke protected workspace for unmanaged
devices:
• Restrict USB access
• Cache cleaner leaves no trace
• Ensure no malware enters corporate
network
Web
Dynamic End-User Webtop
• Customizable and localizable list of resources
• Adjusts to mobile devices
• Toolbar, help and disconnect buttons
INTERNET
INTERNAL LAN
VLAN2
INTERNAL LAN
VLAN1
Mobile users
Branch office
users
Wireless users
LAN users
BIG-IP LTM +APM
BIG-IP LTM VE +APM
-OR-
Virtual desktops
VDI VDI VDI VDI
Hypervisor
AUTO-CONNECT TO THE VPN
Always connected application access
BIG-IP Edge Client
Web-delivered and standalone client
• Mac, Windows, Linux
• iPhone, iPad, iTouch
• Android
• Endpoint inspection
• Full SSL VPN
• Per-user flexible policy
Enable mobility
• Smart connection roaming
• Uninterrupted application sessions
Accelerate access
• Adaptive compression
• Client-side cache
• Client-side QoS
Addressing today’s
IT challenges
SIMPLIFYING VDI
F5 Networks, Confidential
Local and
remote users
L-DNS
Geo-location
services
BIG-IP Global Traffic
Manager
Monitoring
vs. iQuery
BIG-IP LTM+APMData center
BIG-IP LTM+APMData center
BIG-IP LTM+APMData center
Global Traffic Manager improves VDI performance
• Xen App/Desktop users sent to
best data center
• Continuous monitoring of
entire infrastructure including
network & application health
• Automatic failover during
outages
• Persistence prevents broken
sessions
SINGLE NAMESPACE FOR GLOBAL AVAILABILITY
Use case
Enhancing web access
management
Create policy
Corporate domain
Latest AV software
Current O/S
Administrator
User = HR
HR
AAA
server
• Proxy the web applications to
provide
authentication, authorization, endpo
int inspection, and more – all typing
into Layer 4-7 ACLS through F5’s
Visual Policy Editor
ENHANCING WEB ACCESS MANAGEMENT
Use case
8 3 2 8 4 9
Users Web servers
App 1
App 2
App 3
WAM proxy
• Endpoint inspection
• Scaling and high availability for
the application and OAM
directory
• Web application security
• Web application acceleration
• Enterprise class architecture
LTM = Local Traffic Manager
ASM = Application Security Manager
WA= WebAccelerator
OAM = Oracle Access Manager
BIG-IP LTM APM
Endpoint security
checks
+ ASM or WA
Oracle access mgr.
Additional BIG-IP benefits
RICHER APPLICATION DELIVERY
Virtualization
HA,LB
Virtualization
(HA, LB for directories)
STREAMLINING EXCHANGE
Consolidating App
Authentication (SSO)
• Dramatically reduce
infrastructure costs;
increase productivity
• Provides seamless
access to all web
resources
• Integrated with
common applications
Use case
CONSOLIDATING APP AUTHENTICATION (SSO)
AAA
server
Corporate
managed device
Latest AV software
Expense
report app
Finance
Salesforce.com
User = Finance
What is the problem?
• Users authenticate to their enterprise, but more and more
resources are hosted elsewhere….
• How do we maintain control of those credentials, policies
and their lifecycle?
What is SAML?
• Security Assertion Markup Language
• Solid standard current version 2.0 (March 2005)
• Strong commercial and open source support
• An XML-based open standard data format for exchanging
authentication and authorization data between parties, in
particular, between an identity provider (iDP) and a
service provider (SP).”
What is SAML? Now in English
• Its ‘Internet/Web’ SSO
• Eliminates Need for Multiple Passwords/Password
Databases in Multiple Locations
• Enables Enterprise in the ‘Cloud’
SAML – SSO Redirect Post
• Dramatically reduce
infrastructure costs;
increase productivity
• Provides seamless
access to all web
resources
• Integrated with
common applications
Use case
CONSOLIDATING APP AUTHENTICATION (SSO)
AAA
server
Corporate
managed device
Latest AV software
Expense
report app
Finance
User = Finance
Load Balancing AD FS Infrastructure with BIG-IP
Of f i ce 365
Shar ePoi nt Onl i ne
Exchange Onl i ne
Lync Onl i ne
Cor por at e Net wor k
AD FS Far m
Act i ve
Di r ect or y
Per i met er Net wor k
AD FS Pr oxy Far m
Cor por at e
User s
• Local Traffic Manager
• Intelligent traffic management
• Advanced L7 health monitoring – (Ensures the AD FS service is responding)
• Cookie-based persistence
Cor por at e Net wor k
AD FS Far m
Act i ve
Di r ect or y
Cor por at e
User s
Of f i ce 365
Shar ePoi nt Onl i ne
Exchange Onl i ne
Lync Onl i ne
Load Balancing AD FS with Local Traffic Manager
Per i met er Net wor k
AD FS Pr oxy Far m
Publishing AD FS with Access Policy Manager
Cor por at e Net wor k
AD FS Far m
Act i ve
Di r ect or y
Cor por at e
User s
Of f i ce 365
Shar ePoi nt Onl i ne
Exchange Onl i ne
Lync Onl i ne
Load Balancing AD FS with Local Traffic Manager
Replacing the AD FS Proxy farm with APM provides:
• Enhanced Security
• Variety of authentication methods
• Client endpoint inspection
• Multi-factor authentication
• Improved User Experience
• SSO across on-premise and cloud-based
applications
• Single-URL access for hybrid deployments
• Simplified Architecture
• Removes the AD FS proxy farm layer as well as
the need to load balance the proxy farm
Federating with Access Policy Manager and SAML
• Available with version 11.3, APM includes full SAML support
• Ability to act as IDP, (Identity Provider) for access to external claims-based resources including
Office 365
• Act as service provider, (SP) to facilitate federated access to on-premise applications
• Streamlined architecture, (no need for the AD FS architecture)
• Simplified iApp deployment
Cor por at e Net wor k
Act i ve Di r ect or y
Cor por at e
User s
Of f i ce 365
Shar ePoi nt Onl i ne
Exchange Onl i ne
Lync Onl i ne
Logging and reporting
Detailed Reporting
BIG-IP APM
For example, who accessed app or network and when?
Sample Detailed Report
Gain a deeper understanding:
• All sessions with geo-location
• Local time
• Virtual IP
• Assigned IP
• ACLs
• Applications and OSs
• Browsers
• All sessions
• Customize reports
• Export for distribution
Access and Application Analytics
Stats grouped by
application and user
Provides:
• Business intelligence
• ROI reporting
• Capacity planning
• Troubleshooting
• Performance
Stats collected
• Client IPs
• Client geographic
• User agent
• User sessions
• Client-side latency
• Server latency
• Throughput
• Response codes
• Methods
• URLs
Views
• Virtual server
• Pool member
• Response codes
• URL
• HTTP methods
CONFIDENTIAL
F5 MOBILE APP MANAGER
OVERVIEW
• AppTunnel Termination
• AD/LDAP Tie-in
• User provisioning
• VPE agent for MAM Query
APM-MAM Integration
Existing APM functionality
Delivered at GA
F5 AppTunnel in wrapper
F5 branded applications
Legend
Enterprise premises
AppTunnel
• Device notifications
• Device provisioning
• AppStore/App management
• Basic MDM
• User self-service portal
• Endpoint Insp. (Sideband)
• Provisioning/identity info
tzoori@f5.com

More Related Content

What's hot

Service Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & DeployService Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & DeployRonnie Isherwood
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring Site24x7
 
SharePoint Platform Options
SharePoint Platform OptionsSharePoint Platform Options
SharePoint Platform Optionsaerieconsulting
 
WSO2 Technology Update
WSO2 Technology UpdateWSO2 Technology Update
WSO2 Technology UpdateWSO2
 
The Power of Converged HP BAC and Operations Manager
The Power of Converged HP BAC and Operations ManagerThe Power of Converged HP BAC and Operations Manager
The Power of Converged HP BAC and Operations ManagerStefan Bergstein
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”MarketingArrowECS_CZ
 
IBM ODM Rules Compiler support in IBM Streams V4.2.
IBM ODM Rules Compiler support in IBM Streams V4.2.IBM ODM Rules Compiler support in IBM Streams V4.2.
IBM ODM Rules Compiler support in IBM Streams V4.2.lisanl
 
LiveAction: Visualization, Management, and Control for Cisco IWAN
LiveAction: Visualization, Management, and Control for Cisco IWANLiveAction: Visualization, Management, and Control for Cisco IWAN
LiveAction: Visualization, Management, and Control for Cisco IWANLiveAction IT
 
CA E2E Management - Service Assurance
CA E2E Management - Service AssuranceCA E2E Management - Service Assurance
CA E2E Management - Service AssuranceFred Sim
 
HyperGrid_Customer Presentation
HyperGrid_Customer PresentationHyperGrid_Customer Presentation
HyperGrid_Customer PresentationSyed Arsalan
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSLahav Savir
 
Soft layer cloud without compromise
Soft layer   cloud without compromiseSoft layer   cloud without compromise
Soft layer cloud without compromisemagda3695
 
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by Atidan
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by AtidanGSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by Atidan
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by AtidanDavid J Rosenthal
 
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Alibaba Cloud
 
Full-Stack Observability for IoT Event Stream Data Processing at Penske
Full-Stack Observability for IoT Event Stream Data Processing at PenskeFull-Stack Observability for IoT Event Stream Data Processing at Penske
Full-Stack Observability for IoT Event Stream Data Processing at PenskeVMware Tanzu
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?Akana
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018Chris Phillips
 

What's hot (20)

Service Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & DeployService Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & Deploy
 
ERP monitoring with Applications Manager
ERP monitoring with Applications ManagerERP monitoring with Applications Manager
ERP monitoring with Applications Manager
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring
 
SharePoint Platform Options
SharePoint Platform OptionsSharePoint Platform Options
SharePoint Platform Options
 
WSO2 Technology Update
WSO2 Technology UpdateWSO2 Technology Update
WSO2 Technology Update
 
The Power of Converged HP BAC and Operations Manager
The Power of Converged HP BAC and Operations ManagerThe Power of Converged HP BAC and Operations Manager
The Power of Converged HP BAC and Operations Manager
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
IBM ODM Rules Compiler support in IBM Streams V4.2.
IBM ODM Rules Compiler support in IBM Streams V4.2.IBM ODM Rules Compiler support in IBM Streams V4.2.
IBM ODM Rules Compiler support in IBM Streams V4.2.
 
LiveAction: Visualization, Management, and Control for Cisco IWAN
LiveAction: Visualization, Management, and Control for Cisco IWANLiveAction: Visualization, Management, and Control for Cisco IWAN
LiveAction: Visualization, Management, and Control for Cisco IWAN
 
CA E2E Management - Service Assurance
CA E2E Management - Service AssuranceCA E2E Management - Service Assurance
CA E2E Management - Service Assurance
 
HyperGrid_Customer Presentation
HyperGrid_Customer PresentationHyperGrid_Customer Presentation
HyperGrid_Customer Presentation
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
 
Soft layer cloud without compromise
Soft layer   cloud without compromiseSoft layer   cloud without compromise
Soft layer cloud without compromise
 
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by Atidan
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by AtidanGSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by Atidan
GSX Monitor and Analyzer for Microsoft Lync 2013 - Presented by Atidan
 
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
 
Full-Stack Observability for IoT Event Stream Data Processing at Penske
Full-Stack Observability for IoT Event Stream Data Processing at PenskeFull-Stack Observability for IoT Event Stream Data Processing at Penske
Full-Stack Observability for IoT Event Stream Data Processing at Penske
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018
 
Hybrid cloud monitoring - Mumbai seminar
Hybrid cloud monitoring - Mumbai seminarHybrid cloud monitoring - Mumbai seminar
Hybrid cloud monitoring - Mumbai seminar
 

Similar to F5 GOV Round Table - Securing Application Access

Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterTzoori Tamam
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
IT Automation With CFEngine - Business Value and Basic Concepts
IT Automation With CFEngine - Business Value and Basic ConceptsIT Automation With CFEngine - Business Value and Basic Concepts
IT Automation With CFEngine - Business Value and Basic ConceptsCFEngine
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101Zivaro Inc
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You Castleforce
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentationEimantas
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...Amazon Web Services
 
AP Automation System
 AP Automation System AP Automation System
AP Automation SystemAtul Kapoor
 
What's New in IBM Streams V4.2
What's New in IBM Streams V4.2What's New in IBM Streams V4.2
What's New in IBM Streams V4.2lisanl
 
HyperGrid Journey to Automation
HyperGrid Journey to AutomationHyperGrid Journey to Automation
HyperGrid Journey to AutomationHyperGrid
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...Amazon Web Services Korea
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitecturePeter Silva
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsMiftakhZein1
 

Similar to F5 GOV Round Table - Securing Application Access (20)

Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data Center
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
IT Automation With CFEngine - Business Value and Basic Concepts
IT Automation With CFEngine - Business Value and Basic ConceptsIT Automation With CFEngine - Business Value and Basic Concepts
IT Automation With CFEngine - Business Value and Basic Concepts
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
Oow2016 review--paas-microservices-
Oow2016 review--paas-microservices-Oow2016 review--paas-microservices-
Oow2016 review--paas-microservices-
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...Critical Considerations for Moving Your Core Business Applications to the Clo...
Critical Considerations for Moving Your Core Business Applications to the Clo...
 
AP Automation System
 AP Automation System AP Automation System
AP Automation System
 
What's New in IBM Streams V4.2
What's New in IBM Streams V4.2What's New in IBM Streams V4.2
What's New in IBM Streams V4.2
 
HyperGrid Journey to Automation
HyperGrid Journey to AutomationHyperGrid Journey to Automation
HyperGrid Journey to Automation
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN Apps
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

F5 GOV Round Table - Securing Application Access

  • 2. BIG-IP Local Traffic Manager + Access Policy Manager Directory SharePoint OWA Cloud Web servers App 1 App n APP OS APP OS APP OS APP OS Hosted virtual desktop Users ENABLE SIMPLIFIED APPLICATION ACCESS with BIG-IP Access Policy Manager (APM)
  • 3. BIG-IP® APM features: • Centralizes single sign-on and access control services • Full proxy L4 – L7 access control at BIG-IP speeds • Adds endpoint inspection to the access policy • Visual Policy Editor (VPE) provides policy-based access control • VPE Rules—programmatic interface for custom access policies • Supports IPv6 BIG-IP® APM ROI benefits: • Scales to 100K users on a single device • Consolidates auth. infrastructure • Simplifies remote, web and application access control *AAA = Authentication, authorization and accounting (or auditing) BIG-IP Access Policy Manager (APM) Unified access and control for BIG-IP
  • 4. Control Access of Endpoints Ensure strong endpoint security Users BIG-IP APM • Antivirus software version and updates • Software firewall status • Machine certificate validation Allow, deny or remediate users based on endpoint attributes such as: Invoke protected workspace for unmanaged devices: • Restrict USB access • Cache cleaner leaves no trace • Ensure no malware enters corporate network Web
  • 5. Dynamic End-User Webtop • Customizable and localizable list of resources • Adjusts to mobile devices • Toolbar, help and disconnect buttons
  • 6. INTERNET INTERNAL LAN VLAN2 INTERNAL LAN VLAN1 Mobile users Branch office users Wireless users LAN users BIG-IP LTM +APM BIG-IP LTM VE +APM -OR- Virtual desktops VDI VDI VDI VDI Hypervisor AUTO-CONNECT TO THE VPN Always connected application access
  • 7. BIG-IP Edge Client Web-delivered and standalone client • Mac, Windows, Linux • iPhone, iPad, iTouch • Android • Endpoint inspection • Full SSL VPN • Per-user flexible policy Enable mobility • Smart connection roaming • Uninterrupted application sessions Accelerate access • Adaptive compression • Client-side cache • Client-side QoS
  • 10. F5 Networks, Confidential Local and remote users L-DNS Geo-location services BIG-IP Global Traffic Manager Monitoring vs. iQuery BIG-IP LTM+APMData center BIG-IP LTM+APMData center BIG-IP LTM+APMData center Global Traffic Manager improves VDI performance • Xen App/Desktop users sent to best data center • Continuous monitoring of entire infrastructure including network & application health • Automatic failover during outages • Persistence prevents broken sessions SINGLE NAMESPACE FOR GLOBAL AVAILABILITY Use case
  • 12. Create policy Corporate domain Latest AV software Current O/S Administrator User = HR HR AAA server • Proxy the web applications to provide authentication, authorization, endpo int inspection, and more – all typing into Layer 4-7 ACLS through F5’s Visual Policy Editor ENHANCING WEB ACCESS MANAGEMENT Use case 8 3 2 8 4 9
  • 13. Users Web servers App 1 App 2 App 3 WAM proxy • Endpoint inspection • Scaling and high availability for the application and OAM directory • Web application security • Web application acceleration • Enterprise class architecture LTM = Local Traffic Manager ASM = Application Security Manager WA= WebAccelerator OAM = Oracle Access Manager BIG-IP LTM APM Endpoint security checks + ASM or WA Oracle access mgr. Additional BIG-IP benefits RICHER APPLICATION DELIVERY Virtualization HA,LB Virtualization (HA, LB for directories)
  • 15.
  • 17. • Dramatically reduce infrastructure costs; increase productivity • Provides seamless access to all web resources • Integrated with common applications Use case CONSOLIDATING APP AUTHENTICATION (SSO) AAA server Corporate managed device Latest AV software Expense report app Finance Salesforce.com User = Finance
  • 18. What is the problem? • Users authenticate to their enterprise, but more and more resources are hosted elsewhere…. • How do we maintain control of those credentials, policies and their lifecycle?
  • 19. What is SAML? • Security Assertion Markup Language • Solid standard current version 2.0 (March 2005) • Strong commercial and open source support • An XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider (iDP) and a service provider (SP).”
  • 20. What is SAML? Now in English • Its ‘Internet/Web’ SSO • Eliminates Need for Multiple Passwords/Password Databases in Multiple Locations • Enables Enterprise in the ‘Cloud’
  • 21. SAML – SSO Redirect Post
  • 22. • Dramatically reduce infrastructure costs; increase productivity • Provides seamless access to all web resources • Integrated with common applications Use case CONSOLIDATING APP AUTHENTICATION (SSO) AAA server Corporate managed device Latest AV software Expense report app Finance User = Finance
  • 23. Load Balancing AD FS Infrastructure with BIG-IP Of f i ce 365 Shar ePoi nt Onl i ne Exchange Onl i ne Lync Onl i ne Cor por at e Net wor k AD FS Far m Act i ve Di r ect or y Per i met er Net wor k AD FS Pr oxy Far m Cor por at e User s • Local Traffic Manager • Intelligent traffic management • Advanced L7 health monitoring – (Ensures the AD FS service is responding) • Cookie-based persistence
  • 24. Cor por at e Net wor k AD FS Far m Act i ve Di r ect or y Cor por at e User s Of f i ce 365 Shar ePoi nt Onl i ne Exchange Onl i ne Lync Onl i ne Load Balancing AD FS with Local Traffic Manager Per i met er Net wor k AD FS Pr oxy Far m
  • 25. Publishing AD FS with Access Policy Manager Cor por at e Net wor k AD FS Far m Act i ve Di r ect or y Cor por at e User s Of f i ce 365 Shar ePoi nt Onl i ne Exchange Onl i ne Lync Onl i ne Load Balancing AD FS with Local Traffic Manager Replacing the AD FS Proxy farm with APM provides: • Enhanced Security • Variety of authentication methods • Client endpoint inspection • Multi-factor authentication • Improved User Experience • SSO across on-premise and cloud-based applications • Single-URL access for hybrid deployments • Simplified Architecture • Removes the AD FS proxy farm layer as well as the need to load balance the proxy farm
  • 26. Federating with Access Policy Manager and SAML • Available with version 11.3, APM includes full SAML support • Ability to act as IDP, (Identity Provider) for access to external claims-based resources including Office 365 • Act as service provider, (SP) to facilitate federated access to on-premise applications • Streamlined architecture, (no need for the AD FS architecture) • Simplified iApp deployment Cor por at e Net wor k Act i ve Di r ect or y Cor por at e User s Of f i ce 365 Shar ePoi nt Onl i ne Exchange Onl i ne Lync Onl i ne
  • 28. Detailed Reporting BIG-IP APM For example, who accessed app or network and when?
  • 29. Sample Detailed Report Gain a deeper understanding: • All sessions with geo-location • Local time • Virtual IP • Assigned IP • ACLs • Applications and OSs • Browsers • All sessions • Customize reports • Export for distribution
  • 30. Access and Application Analytics Stats grouped by application and user Provides: • Business intelligence • ROI reporting • Capacity planning • Troubleshooting • Performance Stats collected • Client IPs • Client geographic • User agent • User sessions • Client-side latency • Server latency • Throughput • Response codes • Methods • URLs Views • Virtual server • Pool member • Response codes • URL • HTTP methods
  • 31. CONFIDENTIAL F5 MOBILE APP MANAGER OVERVIEW
  • 32.
  • 33.
  • 34. • AppTunnel Termination • AD/LDAP Tie-in • User provisioning • VPE agent for MAM Query APM-MAM Integration Existing APM functionality Delivered at GA F5 AppTunnel in wrapper F5 branded applications Legend Enterprise premises AppTunnel • Device notifications • Device provisioning • AppStore/App management • Basic MDM • User self-service portal • Endpoint Insp. (Sideband) • Provisioning/identity info
  • 35.
  • 36.
  • 37.
  • 38.

Editor's Notes

  1. BIG-IP APM = AAA control on BIG-IP Integrates with AAA servers—including Active Directory, LDAP, RADIUS, and Native RSA SecurID
  2. Add-On Module for BIG-IP Family (For new BIG-IP platforms, e.g. 3600, 3900, 6900, 6900 FIPS, 8900, 8950 and 11050. Available as an add-on module for BIG-IP LTM.)Access Profile for Local Traffic Virtual Servers (Very simple configuration to add an Access Policy to an LTM Virtual. Just select an Access Profile from the pulldown menu under the LTM Virtual configuration page. The rest of the Access Policy is configured under the Access Control left-hand menu, where AAA servers are configured, ACLs and ACEs are defined, and VPE is used to create the visual policy.)APM Policy Engine (This is the advanced policy engine behind APM add-on for BIG-IP)Industry Leading Visual Policy Editor (VPE) (See screenshot. Next generation of visual policy editor which has been a big selling point for FirePass. Others, e.g. Cisco, and started trying to copy, but years behind in this area).VPE Rules (TCL-based) for Advanced Policies (Ability to edit the iRules-like TCL rules behind the VPE directly, for advanced configurations, or to create all new rules for custom deployments. Tight integration between the VPE rules and TMM iRules – e.g. ability to drive Access Policies via TMM iRules, Access Policy creating new iRules events, etc.).Endpoint SecurityMore than a dozen different endpoint security checks available (Large number of agents available, e.g. Virtual Keyboard, AV and firewall checks, process, file, and registry checks, extended Windows info, client and machine certificates, etc.)Manage endpoints via Group Policy enforcement and Protected Workspace (Endpoint remediation capabilities like Protected Workspace and Full Armor-based AD Policy enforcement, in addition to Cache Cleaner, redirects to remediation pages, and message and decision boxes).Authentication and AuthorizationFlexible authentication and authorization capabilities via client cert, AD, LDAP, RADIUS, RSA SecurID agents (Broad array of authentication, authorization, and accounting capabilities – including RADIUS accounting).Access ControlHigh-Performance Dynamic Layer 4 and Layer 7 (HTTP/HTTPS) ACLs (Role/User-based Access Control engine built directly into TMM, via hudfilters. Supports dynamic assignment and enforcement of layer 4 ACL/firewall capabilities, as well as now supporting dynamic layer-7 HTTP/HTTPS URL-based access controls. High-performance as built directly into dataplane.)
  3. Endpoint SecurityMore than a dozen different endpoint security checks available (Large number of agents available, e.g. Virtual Keyboard, AV and firewall checks, process, file, and registry checks, extended Windows info, client and machine certificates, etc.)Manage endpoints via Group Policy enforcement and Protected Workspace (Endpoint remediation capabilities like Protected Workspace and Full Armor-based AD Policy enforcement, in addition to Cache Cleaner, redirects to remediation pages, and message and decision boxes).
  4. Web Access Management – BIG-IP proxies the customer’s web applications and provides authentication, authorization, endpoint inspection, and more – all typing into Layer 4-7 ACLS through F5’s easy-to-use Visual Policy Editor.
  5. Exchange / Active Sync – The application Access solution helps secure Exchange deployment across Active Sync / Mobile, Outlook Web Access and Outlook Anywhere. In addition to access control and security, F5 can aid in disaster recover, Exchange 2007 to 2010 migration and provide single namespace capabilities. Secures Active Sync / Mobile, OWA and Outlook AnywhereAssists in disaster recovery and Exchange 2007 to 2010 migrationMigrate over time Authenticate usersSingle URL accessManaged accessAfter migrationScale to 60K usersNo cross-CAS overhead High availabilityExpanded bullets:Solution allows organizations to migrate over-time while BIG-IP APM authenticated users in the DMZ to ensure there are no unknown users accessing the system.Organizations can distribute a single URL and depending on user or group – BIG-IP APM will direct the user to the appropriate server for Exchange iteration (OWA / ActiveSync or Outlook Anywhere)This give users direct access to email without updating bookmarks or settingsOranizations can alsom manage email access for all devices from all locations and any network.
  6. Single sign-on (SSO) – users login to BIG-IP once and enjoy seamless access to all web resources, leveraging a variety of SSO methods (SAML, Credential Caching, Kerberos) to integrate with common applications. This allows system administrators to provision and de-provision application to applications uniformly, even when apps live in the cloudF5 HelpsDramatically reduce infrastructure costs; increase productivityProvides seamless access to all web resourcesIntegrated with common applications
  7. Single sign-on (SSO) – users login to BIG-IP once and enjoy seamless access to all web resources, leveraging a variety of SSO methods (SAML, Credential Caching, Kerberos) to integrate with common applications. This allows system administrators to provision and de-provision application to applications uniformly, even when apps live in the cloudF5 HelpsDramatically reduce infrastructure costs; increase productivityProvides seamless access to all web resourcesIntegrated with common applications
  8. Supports users worldwide Secure IPsec site to site tunnelsFast apps to Edge Client usersVirtual and standalone deploymentsAPM v11 on Edge Gateway surpasses VPN feature parity IPSec (iSessions) site to site (gateway to gateway) extending layer 3 networks vs. initial IPSec (client to site) where normally SSL VPN is a replacementApp Tunnels: new and improved Easily configurable Dynamic WebtopFlash patching