Forum Discussion
JohnnySV
Nimbostratus
Sep 28, 2023How does F5 Protect from Token Theft
We currently use F5 to establish secure connections to our remote desktop sessions for remote users. These users are using their personal machines so we dont provide any additional NextGen AV protect...
PSFletchTheTek
Cumulonimbus
Sep 29, 2023Hi,
Which functions / modules are you using?
APM and AWAF could possibly be used to look for more than cookies.
So cookies and say orginating IP. So if the IP changes it might have been hijacked.
But if someone is on a mobile connection which could have its IP changed mid-session this may course other issues.
If you're using APM - you could look at client cert verification, or the agent to try to be more comfortable that your connection isn't hijackable.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
