Forum Discussion
JJ_41469
Nimbostratus
May 23, 2014Query AD for Account Lockout status in APM/iRules
I currently have an APM policy that does cert auth then gets a Kerberos ticket on behalf of the user. My management wants to add an account lockout feature, so we could use this same setup to detect...
kunjan
Nimbostratus
May 28, 2014The Kerberos TGT cache life time by default in APM is 600 minutes. The lowest it can go is 10 minutes. During this period if the account is locked, it can't be detected by SSO.
But after that for the new request, Kerberos(S4U2Self) will fail if the account is locked and server will throw 401. So if we capture this 401 and restart the APM session, I guess we can go to the AD query to check for the account status.Try if this helps; tune "ticket-lifetime 10" in the Kerberos SSO and apply the iRule.
when HTTP_RESPONSE {
if { [HTTP::status] == 401 } {
ACCESS::session remove
HTTP::respond 302 Location "/" "Set-Cookie" "MRHSession=0; expires=Tuesday, 29-Mar-1970 00:15:00 GMT" "Connection" "Close"
}
}
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
