Skip to main content
TrustRadius
F5 BIG-IP Access Policy Manager (APM)

F5 BIG-IP Access Policy Manager (APM)

Overview

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Read more
Recent Reviews
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

17 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is NetScaler Gateway?

NetScaler Gateway (formerly Citrix Gateway) is an access gateway with SSL VPN solution, providing single sign-on (SSO) and authentication for remote end users of network assets.

Return to navigation

Product Details

What is F5 BIG-IP Access Policy Manager (APM)?

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to the user's network, the cloud, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Identity Aware Proxy is key to both a Zero Trust security architecture and to F5 BIG-IP APM. BIG-IP APM and F5 Access Guard deliver Identity Aware Proxy using a Zero Trust validation model on every application access request. Providing authenticated and authorized users secure access to specific applications, it leverages F5 best-in-class access proxy. BIG-IP APM centralizes user identity and authorization. Authorization is based on the principles of least privileged access.

F5 BIG-IP Access Policy Manager (APM) Features

  • Supported: Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
  • Supported: Context-based authorization with dynamic L4/L7 ACLs
  • Supported: Seamless integration with third-party MFA solutions
  • Supported: DTLS 2.0 mode for delivering and securing applications
  • Supported: SAML 2.0 identity federation support
  • Supported: Support for OAuth 2.0 authorization protocol
  • Supported: SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
  • Supported: Granular access policy enforcement
  • Supported: AAA server authentication and high-availability
  • Supported: Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
  • Supported: BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
  • Supported: Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
  • Supported: Scales up to 2 million concurrent access sessions

F5 BIG-IP Access Policy Manager (APM) Competitors

F5 BIG-IP Access Policy Manager (APM) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

NetScaler ADC, Ivanti Connect Secure, and Zscaler Private Access are common alternatives for F5 BIG-IP Access Policy Manager (APM).

The most common users of F5 BIG-IP Access Policy Manager (APM) are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(21)

Reviews

(1-10 of 10)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Simple pushing of updates out to user workstations
  • Easy to add new tiles to our webtop for new resources
  • Ease of use of the Edge Client is a big point of satisfaction with users
  • CCU Licenses are limited by device and are not shared between APM devices
  • User sessions are not stored globally, so persistence can be an issue with users all over the world
  • Configuration can get complicated when split up between multiple sites
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Source and destination IP Base policy
  • Source and application base policy
  • Ssl VPN with load balancing and fail over policy working fine.
  • When u leave it for long enough it get disconnected
  • GUI Not loos friendly
  • Reporting not good
Mohammed Younus Siddiqui | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Remote Access to the local computer.
  • Application Security.
  • Authentication.
  • Two Factor Authentication Implementation.
  • UI/UX can be quick and modern.
  • The application hosting is not one-click.
  • You cannot observer the changes done for external users internally.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Ease the process in different policy creation
  • API protection
  • Employs Advanced Web Application firewall
  • Auto reconnect feature can be improved once network is restored.
  • Readability of logs can be improved when troubleshooting.
  • Central Management console can be added with more insights and dashboards.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • SAML 2.0 identity federation support.
  • Integrates with third-party SSO solutions.
  • Bridging modern authentication and authorization (SAML, OAuth/OIDC) and classic authentication and authorization methods.
  • Policy routing
  • Hard to use
  • Access Guided Configuration (AGC) should be improved
Mubeen Akhtar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Application access management
  • Ease of administration for the administrator
  • Wide variety of scope coverage including on-premises, cloud, data center etc.
  • Cloud service management and control can certainly get better
  • Solution is expensive
  • While the customer support is good, there is room for forum discussions that have a good turn-around time for queries.
John DuFour | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Secures access to apps, APIs & data.
  • Simplifies and centralizes access to apps, APIs & data.
  • Authentication module for connections.
  • Policy writing is somewhat complex for the novice.
  • Some kind of training is a necessity.
Return to navigation