F5 and Carahsoft invited attendees to the F5 DoD Virtual User Group (VUG). Security is becoming more challenging as the DoD shifts to a remote workforce and applications reside in multiple locations beyond the traditional data centers. This has caused DoD to look for new and innovative ways to solve the complex problem of real-time authentication and authorization controls. F5’s Zero Trust Architecture uses the Identity Aware Proxy (IAP) to create real-time contextual access decisions regardless of endpoint location. Contextual access can come from a multitude of sources including identity providers, client posture, resource posture, or integration third-party tools.
During this hands-on lab, attendees learned how to:
- Configure IAP using Guided Configuration
- Conduct Client Posture Assessments using F5 Access Guard
- Collect Resource and third-party data via HTTP connector
Prerequisites: Familiarity with BIG-IP operations, LTM Objects (Virtual Servers and Pools), and basic APM concepts