Skip to main content
TrustRadius
F5 BIG-IP Access Policy Manager (APM)

F5 BIG-IP Access Policy Manager (APM)

Overview

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Read more
Recent Reviews
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

18 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is NetScaler Gateway?

NetScaler Gateway (formerly Citrix Gateway) is an access gateway with SSL VPN solution, providing single sign-on (SSO) and authentication for remote end users of network assets.

Return to navigation

Product Details

What is F5 BIG-IP Access Policy Manager (APM)?

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to the user's network, the cloud, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Identity Aware Proxy is key to both a Zero Trust security architecture and to F5 BIG-IP APM. BIG-IP APM and F5 Access Guard deliver Identity Aware Proxy using a Zero Trust validation model on every application access request. Providing authenticated and authorized users secure access to specific applications, it leverages F5 best-in-class access proxy. BIG-IP APM centralizes user identity and authorization. Authorization is based on the principles of least privileged access.

F5 BIG-IP Access Policy Manager (APM) Features

  • Supported: Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
  • Supported: Context-based authorization with dynamic L4/L7 ACLs
  • Supported: Seamless integration with third-party MFA solutions
  • Supported: DTLS 2.0 mode for delivering and securing applications
  • Supported: SAML 2.0 identity federation support
  • Supported: Support for OAuth 2.0 authorization protocol
  • Supported: SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
  • Supported: Granular access policy enforcement
  • Supported: AAA server authentication and high-availability
  • Supported: Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
  • Supported: BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
  • Supported: Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
  • Supported: Scales up to 2 million concurrent access sessions

F5 BIG-IP Access Policy Manager (APM) Competitors

F5 BIG-IP Access Policy Manager (APM) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

NetScaler ADC, Ivanti Connect Secure, and Zscaler Private Access are common alternatives for F5 BIG-IP Access Policy Manager (APM).

The most common users of F5 BIG-IP Access Policy Manager (APM) are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(23)

Reviews

(1-12 of 12)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I think that the platform is well suited to many Remote Access VPN solutions, but I also think there is a lot of room for improvement on the backend. If you are hoping to deploy your APM solution across many different datacenters or colos, it may not be the best choice for the final solution.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We had an access requirement would leveraged APM and the BIG-IP Edge client. We needed to restrict access depending on the origin of the public IP address. By leveraging APM and iRules were were able to address this complicated request.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Simplify access to on-premises and cloud apps with a SSO.control acces to web based applications and web filtering. Provide single management console.adaptive identity federation SSO, and MFA employing SAML and secure user experience across all apps.protect against data loss,malware and rouge devices access with comprehensive continuous endpoint integration and security checks.
Mohammed Younus Siddiqui | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
If you already have an F5 implementation or use the LTM for load balancing. Then APM is the most obvious choice for you. It is just an add-on subscription/license to your existing appliance. In this day and age, where remote work is considered the norm then APM is a good solution to ensure your users have the required access wherever they are.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
For larger environments with secure applications that need to be accessed in a more secure way then F5 BIG-IP APM secures, simplifies, and centralizes access to apps. Ease of configuration and user-friendly centralized management. Support SSO and much-needed integrations. Allows creating multiple partitions to accomplish multiple customers. Greater benefit for organization.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
In the current digital world we are moving into, I would recommend F5 for all SMB to enterprise organizations. There are various models to pick from. This helps secure the environment and make the network robust to any sort of attacks. I am not able to think of any reason why one should not deploy or this device is less appropriate because nowadays every small company has application / ERPs. It is also worthwhile to note in case if all your apps are being deployed in the cloud by another service provider who provides you SAAS access, in that case, you can be at ease as securing these app falls on to the provider. However, should the budget be available I would recommend deploy this and enhancing your security.
Mubeen Akhtar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
F5 BIG-IP Access Policy Manager (APM) is excellent access and network control solution, especially when you have the ASM and LTM components since it becomes a part of the larger eco-system. This proves beneficial from skill-set procurement, maintaining the infrastructure and administration as well. The down-sides would be extending these capabilities for in-cloud services and also the fact that the solution is slightly expensive.
John DuFour | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Since our primary website is behind the F5 using it to authenticate connections to our virtual servers is pretty straightforward. It provides a single management interface which is important to us.
Return to navigation