F5BI-LT-000003 – The BIG-IP Core implementation must be configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
Details Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authorization-based...