F5 BIG-IP APM 14.1 - Access Profile Configuration - RSA Ready SecurID Access Implementation Guide
a year ago
Originally Published: 2019-06-25

Perform these steps to apply your RADIUS, SSO Agent, Relying Party or Authentication Agent configuration to F5 BIG-IP APM Access Profile.

 

 

 

Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary in this article for more information.

 

 

 

Configure RSA Cloud Authentication Service

 

Radius Client

 

Sign into the RSA Cloud Administrative Console and browse to Authentication Clients > RADIUS > Select the RADIUS Client and Edit .

 

Ensure the Authentication Details is set to Cloud Authentication Service validates password and applies access policy for additional authentication. is selected

 

Click Publish.

 

Relying Party Client

 

Sign into the RSA Cloud Administrative Console and browse to Authentication Clients > Relying Party > Select the Relying Party Client and Edit .

 

In the Authentication section, do the following:

 

  1. Under Authentication Details,
  2. ensure that RSA SecurID Access manages all authenticationand the appropriate primary and additional authentication methods is selected
  3. Click Next Step.

 

Click Publish.

 

Note:  It is assumed that there is an Access Profile (in this example it is named abtest-access-profile) and a Virtual Server (named as abtest_vs) already created and configured such that it can successfully perform AD authentication to grant access to a protected resource. The following steps gives instructions on how to modify the access profile to use RSA SecurID Access to grant access to the same protected resource. More detailed instructions on how to create and modify access policies and mapping access policies to virtual servers can be found in F5 BIG-IP APM's documentation. The Access Policy before modification is as shown below:
access-policy-note_624x166.png

 

1. Click Main > Access > Profiles / Policies > Access Profiles (Per Session Policies).

 

radius-am-f5-step5.png

 

2. On the Access Profiles page, enter the name of the access profile to be modified in the search box and click Search.

 

3. Click on Edit... corresponding to the access profile to be modified.

 

radius-am-f5-step7_624x121.png

 

4. On the Visual Policy Editor page, click on the x sign on the AD Auth block.

 

radius-am-f5-step8_624x165.png

 

5. On the Item Deletion Confirmation pop-up window, click on the Connect previous node to Successful branch radio button and then click Delete.

 

radius-am-f5-step9.png

 

6. (This step is only for Relying Party and SSO Agent - SAML integration types)
Click on the x sign on the Logon Page block.

 

rel-party-f5-step24.png

 

7. (This step is only for Relying Party and SSO Agent - SAML integration types)
On the Item Deletion Confirmation pop-up window, click on the Connect previous node to fallback branch radio button and then click Delete.

 

rel-party-f5-step26.png

 

8. Click on the + sign next to the fallback branch of the

 

  • Logon Page block (for Authentication Agent, RADIUS with AM and RADIUS with CAS integration types)
  • Start block (for Relying Party and SSO Agent - SAML integration types)

 

(image shown is for Authentication Agent integration type)

 

radius-am-f5-step10.png

 

9. On the pop-up window, click on Authentication tab and then click:

 

  • RSA SecurID radio button (for Authentication Agent integration type)
  • RADIUS Auth radio button (for RADIUS with AM and RADIUS with CAS integration types)
  • SAML radio button (for Relying Party and SSO Agent - SAML integration types)

 

(image shown is for Authentication Agent integration type)

 

agent-f5-step11_624x564.png

 

10. Click Add Item.

 

11. On the next pop-up window, from the AAA Server drop-down list select:

 

  • the RSA SecurID server configured in F5 (for Authentication Agent integration type).
  • the RADIUS server configured in F5 (for RADIUS with CAS and RADIUS with AM integration types).
  • the the SAML SP Service configured in F5 (for Relying Party and SSO Agent - SAML integration types).

 

(image shown is for Authentication Agent integration type)

 

agent-f5-step13.png

 

12. Click Save.

 

13. Click Apply Access Policy and then click Close.

 

radius-am-f5-step14_624x35.png

 

The fully configured access profile for each integration type will look as below:

 

  • Authentication Agent

 

agent-apm-final_624x158.png

 

  • RADIUS with AM and RADIUS with CAS

 

radius-am-apm-final_624x157.png

 

  • Relying Party and SSO Agent - SAML

 

rel-party-apm-final.png

 

 

 

Return to Configuration Summary.

 

You are here

F5 BIG-IP APM 14.1 - Access Profile Configuration - RSA Ready SecurID Access Implementation Guide