F5 Networks and Carahsoft held a public sector workshop where we hosted a lab on F5’s Zero Trust Architecture and discussed how it shifts many of the objects that would exist in a per-session policy to the per-request policy, thereby creating a more secure authentication and authorization scheme. The authenticity of each request is further enhanced through the use of F5’s Access Guard agent, installed on a client. This agent provides a PKI signed report of the posture assessment performed on the client in real-time, rather than the historical way plug-ins reported status.
The lab portion of this session covered:
- Deploying a simple reverse proxy
- Creating my first policy
- Configuring a VPN policy
- Configuring an APM webtop
- Basic authentication
- Real-time posture assessments
- Per-request frameworks
- Contextual access
- HTTP connector