Manual Chapter : Licensing Initial Setup and Upgrades

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 5.1.0
Manual Chapter

How do I license and do the basic setup to start using BIG-IQ?

The BIG-IQ® system runs as a virtual machine in supported hypervisors, or on the BIG-IQ 7000 series platform. After you download the software image from the F5 Downloads site and upload it to BIG-IQ, you can license system.

You get a license for BIG-IQ using the base registration key you purchased. The base registration key is a character string the F5 license server uses to provide BIG-IQ a license to access the features you purchased. You license BIG-IQ in one of the following ways:

  • If the system has access to the Internet, you can have the BIG-IQ system contact the F5 license server and automatically activate the base registration key to get a license.
  • If the system is not connected to the Internet, you can manually license the BIG-IQ using the F5 license server web portal.
  • If the system is in a closed-circuit network (CCN) that does not allow you to export any encrypted information, you must open a case with F5 support.

After you license BIG-IQ, you:

  • Specify a host name for the system.
  • Assign a management port IP address.
  • Specify the IP address of your DNS server and the name of the DNS search domain.
  • Specify the IP address of your Network Time Protocol (NTP) servers and select a time zone.
  • Change the administrator’s default admin and root passwords.

Automatically licensing BIG-IQ and performing initial setup

You must have a base registration key before you can license the BIG-IQ® system. If you do not have a base registration key, contact the F5 Networks sales group (http://www.f5.com).
If the BIG-IQ® system is connected to the public internet, you can follow these steps to automatically perform the license activation and perform the initial setup.
  1. Use a browser to log in to BIG-IQ by typing https://<management_IP_address>, where <management_IP_address> is the address you specified for device management.
  2. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  3. Click Activate.
    The Base Registration Key field is added to the screen.
  4. In the Base Registration Key field, type or paste the BIG-IQ registration key.
  5. In the Add-On Keys field, paste any additional license key you have.
  6. To add another additional add-on key, click the + sign and paste the additional key in the new Add-On Keys field.
  7. For the Activation Method setting, select Automatic, and click the Activate License button.
    The End User Software License Agreement (EULA) displays.
  8. To accept the license agreement, click the Agree button.
  9. Click the Next button at the right of the screen.
    If the license you purchased supports both Logging Node and BIG-IQ Central Management Console, the License Feature Selection popup screen opens. Otherwise the Management Address screen opens.
  10. If you are prompted with the License Feature Selection, select BIG-IQ Central Management Console, and then click OK. If you are not prompted, proceed to the next step.
    Important: This choice cannot be undone. Once you license a device as a BIG-IQ Management Console, you cannot change your mind and license it as a Logging Node.
    The Management Address screen opens.
  11. In the Host Name field, type a fully-qualified domain name (FQDN) for the system.
    You cannot change this name after you add it. The FQDN can consist of letters and numbers, as well as the characters underscore ( _ ), dash ( - ), or period ( . ).
  12. In the Management Port IP Address field, type the IP address for the management port IP address.
    Note: The management port IP address must be in Classless Inter-Domain Routing (CIDR) format. For example: 10.10.10.10/24.
  13. In the Management Port Route field that the system creates, type the IP address for the management port route.
  14. Specify what you want the BIG-IQ to use for the Discovery Address.
    • To use the management port, select Use Management Address.
    • To use the internal self IP address, select Self IP Address, and type the IP address.
      Note: The self IP address must be in Classless Inter-Domain Routing (CIDR) format. For example: 10.10.10.10/24.
  15. Click the Next button at the right of the screen.
  16. In the DNS Lookup Servers field, type the IP address of your DNS server.
    You can click the Test Connection button to verify that the IP address is reachable.
  17. In the DNS Search Domains field, type the name of your search domain.
    The DNS search domain list allows the BIG-IQ system to search for local domain lookups to resolve local host names.
  18. In the Time Servers fields, type the IP addresses of your Network Time Protocol (NTP) servers.
    You can click the Test Connection button to verify that the IP address is reachable.
  19. From the Time Zone list, select your local time zone.
  20. Click the Next button at the right of the screen.
  21. In the Old Password fields, type the default admin and root passwords, and then type a new password in the Password and Confirm Password fields.
  22. Click the Next button at the right of the screen.

Manually licensing BIG-IQ and performing initial setup

You must have a base registration key before you can license the BIG-IQ® system. If you do not have a base registration key, contact the F5 Networks sales group (http://www.f5.com).
If the BIG-IQ® system is not connected to the public internet, you can follow these steps to contact the F5 license web portal then perform the initial setup.
  1. Use a browser to log in to BIG-IQ by typing https://<management_IP_address>, where <management_IP_address> is the address you specified for device management.
  2. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  3. Click Activate.
    The Base Registration Key field is added to the screen.
  4. In the Base Registration Key field, type or paste the BIG-IQ registration key.
  5. In the Add-On Keys field, paste any additional license key you have.
  6. For the Activation Method setting, select Manual and click the Generate Dossier button.
    The BIG-IQ system refreshes and displays the dossier in the Device Dossier field.
  7. Select and copy the text displayed in the Device Dossier field.
  8. Click the Access F5 manual activation web portal link.
    The Activate F5 Product site opens.
  9. Into the Enter your dossier field, paste the dossier.
    Alternatively, if you saved the file, click the Choose File button and navigate to it.
    After a pause, the license key text displays.
  10. Click the Next button.
    The Accept User Legal Agreement screen opens.
  11. To accept the license agreement, select the I have read and agree to the terms of this license, and click Next. button.
    The licensing server creates the license key text.
  12. Copy the license key.
  13. In the License Text field on BIG-IQ, paste the license text.
  14. Click the Activate License button.
  15. Click the Next button at the right of the screen.
    If the license you purchased supports both Logging Node and BIG-IQ Central Management Console, the License Feature Selection popup screen opens. Otherwise the Management Address screen opens.
  16. If you are prompted with the License Feature Selection, select BIG-IQ Central Management Console, and then click OK. If you are not prompted, proceed to the next step.
    Important: This choice cannot be undone. Once you license a device as a BIG-IQ Management Console, you cannot change your mind and license it as a Logging Node.
    The Management Address screen opens.
  17. In the Host Name field, type a fully-qualified domain name (FQDN) for the system.
    You cannot change this name after you add it. The FQDN can consist of letters and numbers, as well as the characters underscore ( _ ), dash ( - ), or period ( . ).
  18. In the Management Port IP Address field, type the IP address for the management port IP address.
    Note: The management port IP address must be in Classless Inter-Domain Routing (CIDR) format. For example: 10.10.10.10/24.
  19. In the Management Port Route field that the system creates, type the IP address for the management port route.
  20. Specify what you want the BIG-IQ to use for the Discovery Address.
    • To use the management port, select Use Management Address.
    • To use the internal self IP address, select Self IP Address, and type the IP address.
      Note: The self IP address must be in Classless Inter-Domain Routing (CIDR) format. For example: 10.10.10.10/24.
  21. Click the Next button to save your configuration.
  22. In the DNS Lookup Servers field, type the IP address of your DNS server.
    You can click the Test Connection button to verify that the IP address is reachable.
  23. In the DNS Search Domains field, type the name of your search domain.
    The DNS search domain list allows the BIG-IQ system to search for local domain lookups to resolve local host names.
  24. In the Time Servers fields, type the IP addresses of your Network Time Protocol (NTP) servers.
    You can click the Test Connection button to verify that the IP address is reachable.
  25. From the Time Zone list, select your local time zone.
  26. Click the Next button at the right of the screen.
  27. In the Old Password fields, type the default admin and root passwords, and then type a new password in the Password and Confirm Password fields.
  28. Click the Next button at the right of the screen.

Additional Network Configuration Options

About additional network configuration options

During the licensing and initial configuration procedures, you configure a single VLAN and associated self IP addresses. This is all the networking configuration required to start managing devices. However, if you find you need additional VLANs and self IP addresses, the BIG-IQ® system provides you with the ability to add them as required.

Adding an additional VLAN

You must have licensed the BIG-IQ® system before you can add a VLAN.
You have the option to configure an additional VLAN after you license and perform the initial configuration of the BIG-IQ system.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. On the left, click NETWORK SETTINGS > VLANs .
  4. Click the Add VLAN button.
  5. In the Name and Description fields, type a unique name and description to identify this new VLAN.
  6. In the Tag field, type an optional tag number.

    A VLAN tag is a unique ID number between 1 and 4094. All messages sent from a host in this VLAN includes the tag as a header in the message to identify the specific VLAN where the source or destination host is located. If you do not assign a tag, BIG-IQ assigns one automatically.

  7. From the Interface list, select the port that you want this VLAN to use.

    The interface is a physical or virtual port that you use to connect the BIG-IQ system to managed devices in your network.

  8. In the MTU field, type an optional frame size value for Path Maximum Transmission Unit (MTU).

    By default, BIG-IP devices use the standard Ethernet frame size of 1518 bytes (1522 bytes if VLAN tagging is used) with the corresponding MTU of 1500 bytes. For BIG-IP devices that support Jumbo Frames, you can specify another MTU value.

  9. Click the Add button at the bottom of the screen to save this VLAN.

Adding an additional self-IP address

You must have configured BIG-IQ® with at least one VLAN before you can add an additional self IP address.
You have the option to configure an additional self IP address after you license and perform the initial configuration of the BIG-IQ system.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click NETWORK SETTINGS > Self IPs .
  5. In the Name field, type a unique name to identify this new self IP address.
  6. In the Address field, type the self IP address and netmask.
  7. In the Description field, type a description for this self IP address.
  8. From the VLAN list, select the VLAN to associate with this self IP address.
  9. Click the Add button at the bottom of the screen to save this new self IP address.

How do I manage access to BIG-IQ and my managed BIG-IP devices?

As a network or system manager, you need a way to differentiate between users, and to limit user access based on how they interact with F5® BIG-IQ® Centralized Management and your managed devices.

You can specify how you want users to be authenticated: locally on BIG-IQ, or remotely through your RADIUS or LDAP server. Additional security is provided through bidirectional trust and verification through key and certificate exchange (AuthN and AuthZ).

To help you manage all of this, it's important that you understand the following concepts:

  • Users - are individuals for whom you are providing access to BIG-IQ resources, including access to managed BIG-IP® devices.
  • User groups - are a way to organize individuals into groups so that you can grant or change the same privileges to several users at once.
  • Roles - are associated with specific privileges, which you grant to users, allowing them to do a set of tasks on BIG-IQ, and on your managed devices.

Changing the default password for the administrator user

When you license and do the initial setup, F5® BIG-IQ® Centralized Management system prompts you to automatically create the administrator user.
For security reasons, it is important to change the administrator role password from the default, admin.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Users .
  5. In the User Name column, click admin.
    The Admin User properties screen opens.
  6. In the Old Password field, type the password.
  7. In the Password and Confirm Password fields, type a new password.
  8. Click the Save button at the bottom of the screen.

Add a locally-authenticated user

Create a user to provide access to F5® BIG-IQ® Centralized Management.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Users .
  5. Click the Add button.
  6. From the Auth Provider list, select Local.
  7. In the User Name field, type the user name for this new user.
  8. In the Full Name field, type a name to identify this user.
    The full name can contain a combination of symbols, letters, numbers and spaces.
  9. In the Password and Confirm Password fields, type the password for the new user.
  10. To associate this user with an existing user group, select the group from the User Groups list.
    You aren't required to associate a user group at this point; you can do that later if you want.
  11. From the User Roles list, select a user role to associate with this user.
    Each role has a set of unique privileges.
  12. Click the Save button at the bottom of the screen.

Create a locally-authenticated user group

You create a user group so that you can easily manage privileges for several users at one time.

  1. Log in to BIG-IQ with your admin user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. At the left, click USER MANAGEMENT > User Groups .
    The User Groups screen opens.
  5. Click the Add button.
  6. In the Name field, type a name for this new user group.
  7. From the Auth Provider list, select Local.
  8. From the Users list, select the user you want to associate with this user group.
    You aren't required to add users at this point; you can do that later.
  9. From the User Roles list, select the user role you want to associate with this user.
    You aren't required to associate a user role at this point; you can do that later.
  10. Click the Save button at the bottom of the screen.
The new group displays in the User Groups list.
You can now add users and associate user roles to this new group.

Can I use my LDAP server to authenticate BIG-IQ users?

F5® BIG-IQ® Centralized Management can verify user credentials against your company's LDAP server (LDAP server versions 2 and 3, and OpenLDAP directory, Apache Directory Server, and Active Directory). After you set up BIG-IQ to use your LDAP server, you can add users and user groups that authenticated by your LDAP server.

Before integrating BIG-IQ with your LDAP server

Before integrating LDAP authentication with the BIG-IQ® system, you must first perform the following tasks:

  • Use an LDAP browser to review the groups and users in your directory's structure and where they're located in the hierarchy of organizational units (OUs).
  • Decide how you want to map user names.
    • The first option is to map users directly to their Distinguished Name (DN) in the directory with a user bind template in the form of uid=<username>, ou=people,o=sevenSeas. For example, when you map John Smith's user name with his DN as uid=<jsmith>, ou=people,o=sevenSeas and he logs in as jsmith, he is correctly authenticated with his user name in the directory through his DN.
    • The second option is to allow users to log in with names that do not map directly to their DN by specifying a userSearchFilter in the form of (&(uid=%s)) when creating the provider. For example, if John Smith's DN is cn=John Smith,ou=people,o=sevenSeas, but you would like him to be able to log in with jsmith, specify a userSearchFilter in the form of (&(jsmith=%s)). If your directory does not allow anonymous binds, you must also specify a bindUser and bindPassword so that the BIG-I system can validate the user's credentials.
  • Decide which groups in your directory to map into BIG-IQ groups.
    • If you configured a bindUser and bindPassword for users, the BIG-IQ system displays a list of groups from which to choose.
    • If you haven't configured this for your users, you must know the DN for each group.
  • Find out the DN where you can for all users and groups. This is the root bind DN for your directory, defined as as rootDN, when you create a provider. The BIG-IQ system uses the root bind DN as a starting point when it searches for users and groups.
  • Find the host IP address for the LDAP server. The default port is 389, if not specified otherwise.

Set up BIG-IQ to use an LDAP server for user authentication

Before you can set up authentication, you must have specified your DNS settings. You usually do this when you license F5® BIG-IQ® Centralized Management.

You can set up F5 BIG-IQ Centralized Management to user your company's LDAP server to authenticate users. You can specify multiple LDAP servers for user authentication.

  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Auth Providers .
    The Auth Providers screen opens.
  5. Click the Add button.
  6. From the Provider Type list, select LDAP.
  7. In the Name field, type a name for this new provider.
    This must be a unique name and can be a maximum of 152 characters.
  8. In the Host field, type the IP address of your LDAP server.
  9. If your Active Directory server uses a port other than the default, 389, in the Port field, type the number of the alternative port.
  10. If you want BIG-IQ to use an SSL port to communicate with the LDAP server, for the SSL Enabled setting, select the Enabled check box.
    Note that the Port setting automatically changes to 636.
  11. If your LDAP server does not allow anonymous binds, in the Bind User and Bind User Password fields, type the full distinguished names and passwords for users with query access.
  12. In the Root DN field, type the root context that contains users and groups.
    The root context must be a full distinguished name.
  13. From the Authentication Method list, select an option.
    • Simple - Select this option to require a user name and password for authentication.
    • None - Select this option to prompt the LDAP server to ignore the user name and password.
  14. In the Search Scope field, type a number to specify the depth at which searches are made.
    Alternatively, you can specify 0 for search only on the named object or 1 for a one-level search scope.
  15. In the Search Filter field, type the LDAP filter expression that determines how users are found.
    The search filter is determined by your LDAP implementation.
  16. In the Connect Timeout field, type the number of milliseconds after which the BIG-IP system stops trying to connect to the LDAP server.
  17. In the Read Timeout field, type the number of seconds the BIG-IP system will wait for a response to a query.
  18. In the User Display Name Attribute field, type the LDAP field to use for the name that BIG-IQ displays.
    When using Active Directory, this is typically displayName.
  19. To direct bind to a distinguished name, in the User Bind Template field, type the name.
    For example, cn={username},ou=people,o=sevenSeas.
    Now, when a user logs in, BIG-IQ inserts the user name into the template in place of the token, and the resulting distinguished name is used to bind to the directory.
  20. To prompt the LDAP provider to search for groups based on a specific display name attribute, in the Group Display Name Attribute field, type an attribute.
    This attribute is typically cn.
  21. Leave the Group Search Filter at its default query to return all groups under the provided rootDN.
    Alternatively, if you have a large number of groups (more than 100), you can base the search on a specific term by typing a query with a {searchterm} token in this field.

    For example: (&(objectCategory=group)(cn={searchterm}*))

  22. To specify a query for finding a users group, in the Group Membership Filter field, type a query string.
    Use the token {userDN} anywhere that the user's distinguished name should be supplied in the LDAP query.

    You can use a {username} token as a substitute for the user’s login name in a query.

    Leave this setting at the default (|(member={username})(uniqueMember={username})) unless the provider is Active Directory.
  23. To specify a query attribute for finding users in a particular group, in the Group Membership User Attribute field, type the attribute.
    When using Active Directory, use memberof. For example: (memberOf=cn=group_name,ou=organizational_unit,dc=domain_component)
    For other LDAP directories, use groupMembershipFilter. For example: (groupMembership=cn=group_name,ou=organizational_unit,o=organization)
  24. Select the Perform Test check box to test this provider.
  25. Click the Save button at the bottom of the screen.
BIG-IQ Centralized Management now authenticates users against the configured LDAP server.

Add a BIG-IQ user authenticated by my LDAP server

If you want to add a user authenticated against your LDAP server, you first have to set up F5® BIG-IQ® Centralized Management with your LDAP server settings.
You create a user so you can then associate that user with a particular role to define access to F5® BIG-IQ® Centralized Management system resources.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. On the left, click USER MANAGEMENT > Users .
  3. Click the Add button.
  4. From the Auth Provider list, select LDAP.
  5. In the User Name field, type the user name for this new user.
  6. In the Full Name field, type a name to identify this user.
    The full name can contain a combination of symbols, letters, numbers and spaces.
  7. In the Password and Confirm Password fields, type the password for the new user.
  8. To associate this user with an existing user group, select the group from the User Groups list.
    You aren't required to associate a user group at this point; you can do that later if you want.
  9. From the User Roles list, select a user role to associate with this user.
    Each role has a set of unique privileges.
  10. Click the Save button at the bottom of the screen.

Create an LDAP-authenticated user group

You create a user group to offer individual users authentication from an LDAP server.

  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. At the left, click USER MANAGEMENT > User Groups .
    The User Groups screen opens.
  5. Click the Add button.
  6. In the Name field, type a name for this new user group.
  7. From the Auth Provider list, select LDAP.
  8. To associate this user group with an existing LDAP group, leave the Remote Group Filter field blank, click the Search button, and select it from the Remote Group list.
  9. In the Group DN field, type the group's distinguished name.
  10. From the User Roles list, select the user role that has the privileges you want to grant to this user group.
  11. Click the Save button at the bottom of the screen.

Can I use my RADIUS server to authenticate BIG-IQ users?

F5® BIG-IQ® Centralized Management can verify user credentials against your company's RADIUS server. After you set up BIG-IQ to use your RADIUS server, you can add users and user groups authenticated by that server.

Set up BIG-IQ to use a RADIUS server for user authentication

Before you can set up authentication, you must have specified your DNS settings. You usually do this when you license F5® BIG-IQ® Centralized Management.

Before you can set up authentication, you must have specified your DNS settings. You usually do this when you license the F5 BIG-IQ Centralized Management system. You can set up F5 BIG-IQ Centralized Management to use your company's RADIUS server. You can add two additional backup RADIUS servers in case the primary server is not available for authentication.

  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Auth Providers .
  5. Click the Add button.
  6. From the Provider Type list, select RADIUS.
  7. In the Name field, type a name for this new provider.
    This must be a unique name and can be a maximum of 152 characters.
  8. In the Host and Port fields, type the RADIUS server's IP address (or fully qualified domain name) and port number for each of the servers you want to configure.

    The primary server is mandatory. A secondary server and tertiary server, which will be used if the primary or secondary servers fail, are optional.

  9. In the Secret field, type the case-sensitive text string used to validate communication.
  10. In the Test User and Test Password fields, type a user and password, then click the Test button to verify that BIG-IQ can reach the RADIUS server
  11. Click the Save button at the bottom of the screen.
You can now associate RADIUS server users and groups with BIG-IQ system roles.

Pre-defined RADIUS groups for authentication

You must have root access to the BIG-IQ system's command line through SSH for this procedure.

Some RADIUS deployments include non-standard, vendor-specific attributes in the dictionary files. For these deployments, you must update the BIG-IQ system's default dictionary. Follow these steps if you want to use pre-defined RADIUS user groups on BIG-IQ.

  1. Copy the TinyRadius .jar file from the BIG-IQ system.
  2. Extract the contents of the TinyRadius .jar file.
  3. Update the file org/tinyradius/dictionary/default_dictionary file, by adding the vendor-specific attributes.
  4. Repack the contents into a new .jar file.
  5. Replace the old TinyRadius .jar on each BIG-IQ system with the new TinyRadius .jar file you created in step 4.

For example:

  1. From a Linux machine, copy the TinyRadius .jar file to your BIG-IQ system by typing: scp <big-iq-user>@<BIG-IQ-Address>:/usr/share/java/TinyRadius-1.0.jar ~/tmp/tinyrad-upgrade/
  2. Extract the file on your Linux Machine by typing: jar -xvf TinyRadius-1.0.jar
  3. Edit the org/tinyradius/dictionary/default_dictionary, adding the vendor-specific attribute.
    rm TinyRadius-1.0.jar
    jar cvf TinyRadius-1.0.jar *
    
  4. Update the jar on the BIG-IQ system by typing: scp TinyRadius-1.0.jar <your_user>@<BIG-IQ address>:/var/tmp/
  5. SSH to the BIG-IQ system and type the following commands:
    mount -o remount,rw /usr
    cp /var/tmp/TinyRadius-1.0.jar /usr/share/java
    mount -o remount,ro /usr
    bigstart restart restjavad
    
  6. Repeat steps 4 and 5 for each BIG-IQ in a HA configuration.
Now you can use the vendor-specific attributes RADIUS to create your user groups on BIG-IQ.

Add a BIG-IQ user authenticated by my RADIUS server

If you want to add a user authenticated against your RADIUS server, you first have to set up F5® BIG-IQ® Centralized Management with your RADIUS server settings.
You create a user so you can then associate that user with a particular role to define access to F5® BIG-IQ® Centralized Management resources.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Users .
  5. Click the Add button.
  6. From the Auth Provider list, select RADIUS.
  7. In the Name field, type a name for this server.
    This must be a unique name and a maximum of 152 characters.
  8. In the Host and Port fields, type the RADIUS server's IP address (or fully-qualified domain name) and port number for each of the servers you want to configure.
    A primary server is mandatory. A second and tertiary server (used only if the primary or secondary servers fail) are optional.
  9. In the Secret field, type the case-sensitive text string the RADIUS server uses to validate communication.
  10. In the Test User and Test Passwords fields, type a user name and password, then click the Test button to verify that BIG-IQ can reach the RADIUS server.
  11. Click the Save button at the bottom of the screen.

Create a RADIUS-authenticated user group

You create a user group to offer individual users authentication from a RADIUS server.

  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. At the left, click USER MANAGEMENT > User Groups .
    The User Groups screen opens.
  5. Click the Add button.
  6. In the Name field, type a name for this new user group.
  7. From the Auth Provider list, select RADIUS.
  8. For the Connect Properties setting, into the Key and Value fields, type the key and value for this group's RADIUS server.
  9. From the User Roles list, select the user role that has the privileges you want to grant to this user group.
  10. Click the Save button at the bottom of the screen.

How do I limit privileges for users?

As a system manager, you need a way to limit user privileges based on their responsibilities. To help you do that, F5® BIG-IQ® Centralized Management ships with a set of default roles that you can assign to users. Roles are shared between BIG-IQ systems in a high availability pair, so they remain assigned to users even if the primary BIG-IQ system fails over.

Standard roles shipped with BIG-IQ

F5® BIG-IQ® Centralized Management ships with several standard roles, which you can assign to individual users, or to a user group. Roles are shared between BIG-IQ systems in a high availability pair, so they remain assigned to users even if the BIG-IQ system fails over.

Role Role Description / Access
Administrator This role has access to all licensing aspects of System Management and Device Management. This includes access for adding individual users, assigning roles, discovering BIG-IP® systems, installing updates, activating licenses, and setting up BIG-IQ® in a high availability (HA) configuration.
ADC Deployer This role has access to deploy and view ADC configuration objects for managed ADC devices.
ADC Editor This role has access to edit all ADC configuration objects.
ADC Manager This role has access to all aspects of ADC, including areas involved in creating, viewing, modifying, and deleting Local Traffic and Network objects.
ADC Viewer This role has view-only access for all ADC objects and features.
Access Auditor This role has access to all Access reports and dashboard.
Access Deployer This role has deploy access to Access configuration objects. This role cannot discover and edit devices or policies.
Access Editor This role has edit access to Access configuration objects. This role cannot discover and deploy devices or policies. This role includes the ability to add, update, and delete pools and pool members from the Access configuration object editor.
Access Manager This role has deploy and edit access to Access configuration objects, and has access to Access Reports and Dashboard. This role cannot add or remove devices and device groups, and cannot discover, import, or delete services.
Access Viewer This role has view-only access to Access configuration objects and tasks for Access devices that have been discovered. This role cannot edit, discover, or deploy devices or policies.
Device Manager This role has access to all aspects of Device Management, including areas involved in device discovery, group creation, licensing, software image management, UCS backups, templates, connectors, certificates, self IP addresses, VLANs, and interfaces.
Device Viewer This role has read-only access to all aspects of Device Management, including areas involved in device discovery, group creation, licensing, software image management, UCS backups, templates, connectors, certificates, self IP addresses, VLANs, and interfaces.
Fraud Protection Manager This role has access to all aspects of the Fraud Protection Service functionality for Web Client Security.
Fraud Protection View This role has view-only access to all Fraud Protection Service objects for Web Client Security .
Network Security Deploy This role has access to view and deploy Network Security objects.
Network Security Manager This role has access to all aspects of Network Security, including areas involved in creating, viewing, modifying, and deleting shared and firewall-specific security objects.
Network Security Edit This role has access to create, view, and modify objects for Network Security.
Network Security View This role has view-only access to firewall objects for Network Security. This role cannot edit, discover, or deploy devices or policies.
Security Manager This role has access to all aspects of Network Security, Web Application Security, and Web Client Security, including areas involved in device discovery, creating, viewing, modifying, and deleting Web Application Security, shared and firewall-specific security objects.
Trust Discovery Import This role manages device trust establishment, service discovery, service import, removal of services and removal of trust.
Web App Security Deployer This role can deploy and view ASM configuration objects for managed ASM devices.
Web App Security Editor This role manages config objects within the ASM module.
Web App Security Manager This role has access to all aspects of Web Application Security, including areas involved in creating, viewing, modifying, and deleting shared and web application-specific security objects.
Web App Security Viewer This role permits read-only access to the ASM module.

Associating a user or user group with a role

Before you can associate a user or user group with a role, you must create a user or user group.
When you associate a user or user group with a role, you define the resources users can view and modify. You can associate multiple roles with a given user.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. From the User Roles list, select a user role to associate with this user.
    Each role has a set of unique privileges.
  5. From the Active Users and Groups list, select the users or user groups to add to this role.
  6. Click the Save button at the bottom of the screen.
This user or user group now has the privileges associated with the role you selected.

Disassociating a user from a role

Use this procedure to disassociate a user from an assigned role.
  1. Log in to F5® BIG-IQ® Centralized Management with your user name and password.
  2. At the top left of the screen, select System Management from the BIG-IQ menu.
  3. At the top of the screen, click Inventory.
  4. On the left, click USER MANAGEMENT > Users .
  5. On the Users inventory list, click the name of the user.
    The screen refreshes to display the properties for this user.
  6. From the User Roles list, select the user role to disassociate from this user and click the X.
    The selected user role is removed from the list of privileges assigned to this user.
  7. Click the Save button to save your changes.
This user no longer has the privileges associated with the role you deleted.