TrustRadius: an HG Insights company
F5 BIG-IP Access Policy Manager (APM) Logo

F5 BIG-IP Access Policy Manager (APM) Reviews and Ratings

Rating: 9 out of 10
Score
9 out of 10

Community insights

TrustRadius Insights for F5 BIG-IP Access Policy Manager (APM) are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Pros

Flexibility in Access Restrictions: Users have appreciated the platform's flexibility in managing public access restrictions and implementing IP access restrictions using iRules for enhanced security measures. This level of control allows users to tailor access permissions based on specific conditions and user levels, contributing to a more secure environment.

Easy-to-Use Interface: Reviewers highlighted the user-friendly interface of the platform, making it simple to interpret policies, push updates to workstations, add new tiles to the webtop for additional resources, and perform complex decision-making tasks related to access permissions. The intuitive design streamlines administrative tasks and enhances overall usability.

Effective Security Features: Users praised the implementation of source/destination IP-based policies, SSL VPN with load balancing, two-factor authentication, and other security measures for securing access effectively. These features provide comprehensive protection for applications, APIs, and data while simplifying access management processes.

Reviews

23 Reviews

BIG-IP APM

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

Primarily for policy management and ingress from the Internet for Citrix clients and MS Exchange

Pros

  • Policy management
  • federation

Cons

  • Policy Access module feels outdated
  • Needs checks and balances between authentication methods and their usage within policy, it can be easily confusing and lots of clicking back and forth

Likelihood to Recommend

It's got a lot of areas for customization and I like the policy tree of the policy access manager. It's great for securing ingress to an internal environment, however, the policy access manager looks outdated and can be difficult to find the correct variable type.

Amazing product

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

we use F5 BIG-IP Access Policy Manager (APM) for various authentication, in house IDP, Federation IDP Chaining.

Pros

  • authentication
  • Logs
  • SAMl

Cons

  • integrated Gen AI to build irules/apm

Likelihood to Recommend

I have work with the F5 BIG-IP Access Policy Manager (APM) product for 10 years and don't have a problem with it.

BIG-IP APM as cloud provider replacement

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

I'm a reseller and have experience with our customers using it. APM has been a breeze to replace things like Azure's native API Gateway, I just wish the APM module was available in F5 Distributed Cloud.

Pros

  • Displace native cloud provider's versions of APM
  • Clean & authenticate the traffic coming through
  • Make life easier for customer's SecOps & NetOps teams

Cons

  • Bring the module to XC
  • nothing else I can think of in my experience with it

Likelihood to Recommend

It's well suited as a displacement for a native cloud providers version of APM. F5's APM is much stronger and more capable than others ensuring the customer's traffic arriving at their pools is cleaned and authenticated.

Vetted Review
F5 BIG-IP Access Policy Manager (APM)
7 years of experience

Con Gusto uso F5 (I gladly use F5)

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

Para permitir el acceso de forma segura a las aplicaciones. No hemos tenido mayor problemas con el equipo o la aplicación.

To allow secure access to applications. We haven't had any major issues with the equipment or the application.

Pros

  • Políticas de acceso
  • Access Policies
  • Balanceo
  • Balancing
  • Certificados
  • Certificates
  • Gestión de nodos de granja
  • Farm node management

Cons

  • IA para ayuda de configuración de granjas
  • AI for farm setup help
  • IA para notigicacion de vencimiento de certigicados
  • AI for certificate expiration notification

Likelihood to Recommend

Lo utilizamos normalmente para granjas de servidores Web, granja de RDS, granja de webservices.

We normally use it for Web server farms, RDS farm, webservices farm

F5 BIG-IP Access Policy Manager is boss

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

F5 BIG-IP Access Policy Manager is our remote access VPN tool, to access internal horizon VDIs

Pros

  • Policy Management
  • Federation
  • SAML Authentication
  • Radius Authentication
  • Webtops

Cons

  • TMOSH OS
  • Policy editor
  • SAML Integration

Likelihood to Recommend

Easy to integrate and troubleshoot problems, which are very rare

F5 BIG-IP Access Policy Manager (APM) for COTS applications protection

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

Protecting applications before exposing them to the Internet. Often COTS applications.

Pros

  • Using OAuth with a COTS app that does not support it.
  • Integrated with different authentication systems.

Cons

  • JWT tokens process DIES.
  • UI is cumbersome.
  • Replicating configuration to another F5 cluster is time consuming.

Likelihood to Recommend

Works well for protecting COTS applications using Corporate OAuth solution. Configuration is time consuming. Setting up Auth / LDAP / Irule events is difficult. F5 BIG-IP Access Policy Manager does not include easy native support for different permissions on different paths in the application. Login and error pages are difficult to customize.

F5 BIG-IP Access Policy Manager (APM) The one shop for Identity Management

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We use it to serve as a Service Provider for OKTA.

Pros

  • Manage of JWT tokens
  • Identity Manger
  • Per Session and Per Request access
  • The Visual Policy Editor is awesome

Cons

  • API protect must improve, we are currently having issues with the automatic scheduler for syn with a service Provider.
  • Training material should improve for API protection.

Likelihood to Recommend

Anything that is related to Identity Management.

Vetted Review
F5 BIG-IP Access Policy Manager (APM)
19 years of experience

My review

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We have like 40 F5 BIG-IP Access Policy Manager modules devices in our company and we are searching for the next remote access generation like ZTNA. Unfortunately, F5 is not ready for ZTNA tech, and we have to proceed with other vendors... we like the F5 BIG-IP Access Policy Manager a lot, and it is very useful, but there is no innovation from you guys on it.

Pros

  • Flexibility
  • Easy to configure
  • Stability

Cons

  • I think you should go to ZTNA on cloud for remote access users.

Likelihood to Recommend

Remote access for organizations. SAML authentication.

F5 BIG-IP Access Policy Manager (APM) is great

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

I designed a very custom F5 VPN using F5 BIG-IP Access Policy Manager right before COVID. It allowed our company to stay connected and easily transition most of our IT workforce to work from home in a secure manner, while still giving proper access to our users. It remains one of the best ways for our engineers to connect, and other VPN solutions can't provide the same features that we need in a simple way.

Pros

  • Simplicity in configuration
  • Ease of modifications to workflow (VPE)
  • Visibility into users connecting

Cons

  • Zero trust VPN, so that all connections outbound to external sources are examined
  • A better way to view/showcase the Webpage design and layout within Big-IP for F5 BIG-IP Access Policy Manager

Likelihood to Recommend

I've worked with F5 BIG-IP Access Policy Manager for nearly a decade to manage and configure our VPN, and it fulfills most all of our needs.

Vetted Review
F5 BIG-IP Access Policy Manager (APM)
12 years of experience

F5 BIG-IP Access Policy Manager: Solving the DoD MFA Requirements

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

We utilize this mainly to meet MFA requirements. Displaying DoD Access Warning banners, utilize the F5 BIG-IP Access Policy Manager ability to work with PKI certs, RSA, and authenticate with LDAP to authenticate the user prior to load balancing them.

Pros

  • VPE editor makes for a clean thought out approach to building the policy.
  • Fairly straight forward with where to set up configuration items and reference them in policies.
  • I enjoy how well it communicates with the other modules.

Cons

  • There's some more advanced configurations within OAuth that I think could be fleshed out and easier to approach.
  • There's a lot of things in F5 BIG-IP Access Policy Manager policies that I find myself recreating every policy. An easier way to copy objects from one to policy to another.

Likelihood to Recommend

F5 BIG-IP Access Policy Manager is great to use specifically in the SAML and SSO space. Utilizing WebTop to make a SSO portal for all our SAML resources the F5 serves as an IdP for is quite valuable in our environment.