Access Management

Credentials are the keys to your networks, your applications, and increasingly the API backend of those applications. Preventing unauthorized access is critical to protecting your intellectual property and your data.

TOP CUSTOMER USE CASES

secure access proxy

Secure access proxy



secure Office 365

Secure Office 365

secure VDI

Secure VDI

API security and authorization

API security and authorization

ACCESS ATTACKS AND BUSINESS CHALLENGES

Understanding how apps enable user access—and how apps can be compromised by attackers--can help you streamline processes and meet user expectations while also helping you prevent attacks.

ACCESS ACCESS ACCESS

Credential theft

Most users or customers with a compromised device won’t know they’re infected with malware. A simple username and password required for authentication can be easily stolen by malware-controlled web browsers, and then used to take over a user account.

Brute force

An attacker tries multiple username and password combinations, often using a dictionary of words or commonly used passwords or passphrases, in an attempt to gain unauthorized access to an app or website.

Credential stuffing

A more focused and successful variation of brute force attacks, credential stuffing is the automated injection of previously breached username and password pairs to gain access and take over user accounts. These attacks are fueled by the billions of usernames and passwords that have been stolen in various breaches and can be bought on the darknet. It’s no secret that users frequently re-use passwords across multiple apps or websites, making this attack easier for bad actors to execute.

Decentralized authentication

Fragmented identities and decentralized apps introduce significant risk because of the challenges of enforcing security policies across Software as a Service (SaaS), cloud, and on-premises applications. Centralizing authentication with identity federation can ease the burden on users and administrators.

Access management complexity

With the explosion of applications we use to streamline business operations, user access needs are constantly changing. Manually granting and revoking access at multiple access control points adds management overhead and makes timely access enforcement a challenge. Centralizing access policies can ensure faster enforcement and allow for endpoint health checks, as well as mobile device management (MDM) integration.

Poor user experience

Users expect to easily connect to apps from anywhere and on any device. Forcing users to first connect to the company’s internal network can be frustrating when connecting from a variety of device types. Improve security, user experience, and reduce your admin burden by having consistent access policies that focus on user identity, device health, and app context.

Arrow

Adaptive multi-factor authentication

Dynamically adapt authentication and authorization based on user context, device, and application attributes. This risk-based access management provides security for your data and a better experience for your users.

Access Solutions

Customers use F5 access solutions to address a multitude of use cases.

See buying options

SECURE ACCESS PROXY

Implementing zero trust

As users become more mobile and apps are hosted in numerous data centers and clouds, the traditional network perimeter is tough to defend. Try a different approach by streamlining and protecting authentication and managing access to apps via a centralized access proxy that moves the perimeter to your apps, users, and devices.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

F5’s suite of access management products offers comprehensive protection and easily fit into the environment that makes sense for your organization.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

A software virtual image or appliance for your on-premises, collocated data center or public cloud environment that gives you control over your secure access proxy.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

F5 access solutions are available in both software and hardware, and are deployed inline with all traffic to provide a centralized point of control.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.
 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

SECURE OFFICE 365

Secure access to Office 365

Integrate, simplify, and enhance security of your Active Directory Federation Services (ADFS) infrastructure. Prevent unauthorized access with single sign-on (SSO) and several native and integrated options of multi-factor authentication (MFA). You can also scale your Office 365 deployment as your business grows without the complexity of additional ADFS servers and proxy servers.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

F5’s suite of access management products offers comprehensive protection and easily fit into the environment that makes sense for your organization.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

Software or an appliance for your on-premises, collocated data or public cloud environment that gives you direct control over secure authentication and access management of Office 365 solutions.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

F5 access solutions are available in both software and hardware.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.

 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

SECURE VDI

Secure and scale your VDI infrastructure

As your virtual desktop infrastructure (VDI) solution grows, security and performance can become harder to manage. F5’s solutions can reduce the complexity of your network design via infrastructure consolidation, processing of millions of concurrent sessions, and enabling a centralized gateway for authentication and access. This not only makes your VDI more secure but also eases the management burden with granular access policies.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

F5’s suite of access management products offers comprehensive protection and easily fit into the environment that makes sense for your organization.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

Software or an appliance for your on-premises collocated data center or public cloud environment that gives you control over VDI delivery.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

F5 access solutions are available in both software and hardware.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.
 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

API SECURITY AND AUTHORIZATION

Secure API access

Modern app architectures need to scale up and down as quickly and efficiently as possible, depending on business needs. That means automation is important. Automation requires APIs on every interface, making it difficult to ensure consistent access policies. Implement authorization controls as your first line of defense. The F5 API authorization solution natively supports this need with OAuth/JWT.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

F5’s suite of access management products offers comprehensive protection and easily fit into the environment that makes sense for your organization.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

Software or an appliance for your on-premises, collocated data center or public cloud environment that gives you control over API access policy enforcement.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

Available in software or as an appliance to meet your deployment needs.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.
 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

SINGLE-SIGN-ON

Customize user experience with single sign-on (SSO)

With so many applications, users can’t be expected to remember complex, unique passwords for each one. Through federation of SaaS and other cloud-based apps and the ability to serve as an identity provider for on-premises legacy apps, F5 has the only solution that can give users a single pane of glass for all applications via the same portal. At the same time, you can enhance security with the adaptive MFA capabilities of our SSO solution.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

Available as software or an appliance that lets you create identity-aware, context-based policies.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

Software or an appliance for your on-premises collocated data center or public cloud environment that enables a customized user experience that eliminates passwords.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

Available in software or as an appliance to meet your deployment needs.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.
 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

SSL VPN

Enable trusted remote access

The F5 VPN solution provides end-to-end TLS encryption for client to network or application connections, and IPSEC tunnels between datacenters. The visual policy editor lets you easily create customizable policies that allow for granular customization in authentication options and access management to individual apps, networks, or other resources. You can also inspect several indicators of client or endpoint health that can also factor into access policy decisions. The unique flexibility of this solution makes it much more than a simple VPN.

ACCESS MANAGEMENT PRODUCTS

Access Management Products

F5’s suite of access management products offers comprehensive protection and easily fit into the environment that makes sense for your organization.

Access Manager >

Available as software or an appliance that lets you create identity-aware, context-based policies.

Learn more >

MANAGING YOUR SOLUTION

Managing your solutions

Need help managing your access solution? F5 offers training and professional services.

Learn more >

Self-managed

Software or an appliance for your on-premises, collocated data center or public cloud environment that provides a feature-rich SSL VPN.
 

DEPLOYING YOUR SOLUTION

Deploying your solution

Available in software or as an appliance to meet your deployment needs.

Need help deploying your F5 solution?

Learn more >

Software (virtual edition)

Deploy on any hypervisor within your data center, collocation facility, or in AWS, Azure, or Google Cloud Platform.

Hardware

Deploy high-performance hardware in your on-premises data center or collocation facility.
 

HOW TO BUY

How To Buy

SUBSCRIPTION

Specify the number of instances you need and sign up for a 1-, 2-, or 3-year term that includes maintenance and support for updates.

PERPETUAL

Determine the number of instances you need and set up a licensing agreement. Perpetual licenses extend for the lifetime of the product and are available by individual service or in bundles.

ENTERPRISE LICENSE AGREEMENT (ELA)

Available in 1-, 2-, or 3-year terms, ELAs offer flexibility for large organizations to spin virtual instances up or down as needed. Product maintenance and support are included.

UTILITY

Buy an instance of the service you need through Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform, and just pay hourly for what you use.

2018 APPLICATION PROTECTION REPORT

A typical organization has 765 apps—and each one is a potential target. Are your apps protected?

Read the report

Integrated Partner Solutions

F5 partners with other leading security companies to strengthen security, increases scale and availability, and lowers operational costs. Explore use cases, recommended deployment practices, and other details about our integrated solutions.

ACCESS MANAGEMENT PRODUCTS

ACCESS MANAGER

Available as software or an appliance that lets you create identity-aware, context-based policies.

Secure Web Gateway Services

Gain insight and control over web traffic, and balance web access with security. 

ADVANCED WAF

Protect login forms and APIs from OWASP top 10 threats and other advanced application-layer attacks.

CUSTOMER STORY: Motorists Insurance Group

SINGLE SIGN AND SEAMLESS INTEGRATION REDUCES COSTS, IMPROVES CUSTOMER EXPERIENCE FOR INSURANCE PROVIDER

Read the story

Related Articles

Secure access to Office 365

F5 Secures and Simplifies Microsoft Office 365 Identity and Access Management

Understand access management

The Perimeter: An Identity Crisis

F5 Labs

Lessons Learned from a Decade of Data Breaches

Get Started

Explore security products

See our full range of application security solutions. 

Try F5 in your environment

Get a free 90-day trial of F5 security products.

Actionable threat intelligence

Get the latest intel from F5’s application threat research team.