|
1 | 1 | Lab 1: Deploy PUA with Client Certificate Authentication |
2 | 2 | =============================================================== |
3 | 3 |
|
| 4 | +Overview |
| 5 | +--------------------------------------------------------------- |
| 6 | + |
| 7 | +In this lab, we will focus on configuring and testing MFA (Multifactor Authentication) with F5 APM (Access Policy Manager). |
| 8 | + |
| 9 | +We will be leveraging a client certificate for authentication to the webtop (HTML webpage) and creating ephemeral authentication (one-time password) to the endpoint (router, switch, management UI). |
| 10 | + |
| 11 | +Users will begin the lab by starting the PUA containers and it’s dependencies. We will then access the PUA UI and deploy PUA Smartcard. |
| 12 | + |
| 13 | +The lab will commence with testing and validating user access. |
| 14 | + |
4 | 15 | Solution Design |
5 | 16 | --------------------------------------------------------------- |
6 | 17 |
|
@@ -78,7 +89,7 @@ Task 1 - Start PUA |
78 | 89 |
|
79 | 90 | |image_udf_dep_pua_access| |
80 | 91 |
|
81 | | -#. In the new browser Tab, execute the flowing shell commands to launch the PUA containers and it dependencies : |
| 92 | +#. In the new browser Tab, execute the following shell commands to launch the PUA containers and it dependencies : |
82 | 93 |
|
83 | 94 | .. code-block:: console |
84 | 95 |
|
@@ -265,7 +276,7 @@ Task 3 - Review Deployment details and Deploy |
265 | 276 | Task 4 - Track Deployment progress |
266 | 277 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
267 | 278 |
|
268 | | -If you go back to the **PUA Deploy Agent WebSSH** tab in your local browser, you should see the logs generated by the the deployment of the PUA (SmartCard) Playbook. |
| 279 | +If you go back to the **PUA Deploy Agent WebSSH** tab in your local browser, you should see the logs generated by the deployment of the PUA (SmartCard) Playbook. |
269 | 280 |
|
270 | 281 | #. Confirm that the deployment is successful by looking for **Playbook deployed successfully** log. |
271 | 282 |
|
@@ -305,11 +316,11 @@ Task 2 - Validate user1 Access |
305 | 316 |
|
306 | 317 | #. In the **Applications and Links** section of the Webtop |
307 | 318 |
|
308 | | - * Click on **bigip1** and observe the the username at the bottom left corner |
| 319 | + * Click on **bigip1** and observe the username at the bottom left corner |
309 | 320 |
|
310 | 321 | |image_chrome_incognito_pua_webtop_user1_bigip1| |
311 | 322 |
|
312 | | - * Click on **bigip5** and observe the the username at the bottom left corner |
| 323 | + * Click on **bigip5** and observe the username at the bottom left corner |
313 | 324 |
|
314 | 325 | |image_chrome_incognito_pua_webtop_user1_bigip5| |
315 | 326 |
|
@@ -349,11 +360,11 @@ Task 4 - Validate user2 Access |
349 | 360 |
|
350 | 361 | #. In the **Applications and Links** section of the Webtop |
351 | 362 |
|
352 | | - * Click on **bigip1** and observe the the username at the bottom left corner |
| 363 | + * Click on **bigip1** and observe the username at the bottom left corner |
353 | 364 |
|
354 | 365 | |image_chrome_incognito_pua_webtop_user2_bigip1| |
355 | 366 |
|
356 | | - * Click on **bigip5** and observe the the username at the bottom left corner |
| 367 | + * Click on **bigip5** and observe the username at the bottom left corner |
357 | 368 |
|
358 | 369 | |image_chrome_incognito_pua_webtop_user2_bigip5| |
359 | 370 |
|
@@ -387,6 +398,77 @@ Task 5 - Acces PUA Webtop using an invalid certificate |
387 | 398 |
|
388 | 399 | |image_chrome_incognito_pua_webtop_denied| |
389 | 400 |
|
| 401 | +.. warning:: Close the Incognito window before going to the next task |
| 402 | + |
| 403 | + |
| 404 | + |
| 405 | + |
| 406 | + |
| 407 | + |
| 408 | +Optional Tasks |
| 409 | +--------------------------------------------------------------- |
| 410 | + |
| 411 | +Task 1 - Access PUA Webtop as user1 |
| 412 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 413 | + |
| 414 | +#. Right click on the **PUA Webtop** Bookmark and click on **Open in Incognito window** |
| 415 | + |
| 416 | + |image_chrome_incognito_pua_webtop| |
| 417 | + |
| 418 | +#. Select certificate associated with **User1** in the **Select a certificate** dialog box and Click **Ok**. |
| 419 | + |
| 420 | + |image_chrome_incognito_pua_webtop_user1_cert| |
| 421 | + |
| 422 | +#. Click **Click here to continue** |
| 423 | + |
| 424 | + |image_chrome_incognito_pua_webtop_banner| |
| 425 | + |
| 426 | +#. Webtop should now be available |
| 427 | + |
| 428 | + |image_chrome_incognito_pua_webtop_links| |
| 429 | + |
| 430 | +Task 2 - Validate user1 Access to BIG-IP 5 TMUI |
| 431 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 432 | + |
| 433 | +#. In the **Applications and Links** section of the Webtop |
| 434 | + |
| 435 | + * Click on **bigip5-tmui** and observe at the top of the newly open browser tab that your are connected to the **bigip5.f5lab.local** as **user1** with the **Administrator** role. |
| 436 | + |
| 437 | + |image_chrome_incognito_pua_webtop_user1_bigip5_tmui| |
| 438 | + |
| 439 | + |
| 440 | +Task 3 - Validate user1 Access to a Linux Host |
| 441 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 442 | + |
| 443 | +#. In the **Applications and Links** section of the Webtop |
| 444 | + |
| 445 | + * Click on **linux-host** and observe the username at the bottom left corner |
| 446 | + |
| 447 | + |image_chrome_incognito_pua_webtop_user1_linuxhost| |
| 448 | + |
| 449 | + |
| 450 | + |
| 451 | + |
| 452 | +#. In the **linux-host** tab, elevate access to root by typing the following command: |
| 453 | + |
| 454 | + .. code-block:: console |
| 455 | +
|
| 456 | + sudo -i |
| 457 | +
|
| 458 | + |image_chrome_incognito_pua_webtop_user1_linuxhost_sudo| |
| 459 | + |
| 460 | +#. Click on **Menu** at the bottom left of the screen and select **Credentials** when prompted with **[sudo] password for user1:** |
| 461 | + |
| 462 | + |image_chrome_incognito_pua_webtop_user1_linuxhost_menu_credentials| |
| 463 | + |
| 464 | +#. This will automatically type the ephemeral password for **user1** and the linux prompt should now display **root** |
| 465 | + |
| 466 | + |image_chrome_incognito_pua_webtop_user1_linuxhost_sudo_success| |
| 467 | + |
| 468 | +.. warning:: You successfully completed this lab Close the Incognito window before going to the next lab. |
| 469 | + |
| 470 | + |
| 471 | + |
390 | 472 | |image_end_of_lab| |
391 | 473 |
|
392 | 474 | .. |image_pua_sol_design| image:: media/lab01/pua_smartcard_solution.png |
@@ -450,4 +532,21 @@ Task 5 - Acces PUA Webtop using an invalid certificate |
450 | 532 | :width: 480 |
451 | 533 |
|
452 | 534 |
|
| 535 | + |
| 536 | +.. |image_chrome_incognito_pua_webtop_user1_bigip5_tmui| image:: media/lab01/chrome_incognito_pua_webtop_user1_bigip5_tmui.png |
| 537 | + :width: 480 |
| 538 | +.. |image_chrome_incognito_pua_webtop_user1_linuxhost| image:: media/lab01/chrome_incognito_pua_webtop_user1_linuxhost.png |
| 539 | + :width: 480 |
| 540 | +.. |image_chrome_incognito_pua_webtop_user1_linuxhost_sudo| image:: media/lab01/chrome_incognito_pua_webtop_user1_linuxhost_sudo.png |
| 541 | + :width: 480 |
| 542 | + |
| 543 | + |
| 544 | + |
| 545 | +.. |image_chrome_incognito_pua_webtop_user1_linuxhost_menu_credentials| image:: media/lab01/chrome_incognito_pua_webtop_user1_linuxhost_menu_credentials.png |
| 546 | + :width: 480 |
| 547 | +.. |image_chrome_incognito_pua_webtop_user1_linuxhost_sudo_success| image:: media/lab01/chrome_incognito_pua_webtop_user1_linuxhost_sudo_success.png |
| 548 | + :width: 480 |
| 549 | + |
| 550 | + |
| 551 | + |
453 | 552 | .. |image_end_of_lab| image:: media/lab01/end_of_lab.png |
0 commit comments