Bug ID 1081245: [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one.

Last Modified: Mar 12, 2025

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 15.1.6.1, 15.1.7, 15.1.8, 15.1.8.1, 15.1.8.2, 15.1.9, 15.1.9.1, 15.1.10, 15.1.10.2, 15.1.10.3, 15.1.10.4, 15.1.10.5, 15.1.10.6

Opened: Feb 16, 2022

Severity: 3-Major

Symptoms

SSO Bearer authorization fails.

Impact

Fails to read new token from request and forwards old token in session variables to backend pool after validation.

Conditions

APM PRP is configured with just an OAuth Scope and SSO Bearer attached to PSP.

Workaround

1. Configure a PSP of type 'OAuth-RS' a. Add OAuth Scope b. Add Variable assign with following expression apm policy agent variable-assign /Common/RStype_AP_act_variable_assign_ag { variables { { expression "mcget {session.oauth.client.last.access_token}" secure true varname session.oauth.client./Common/oauth-aad-server.access_token } } } 2. Configure PRP with Gating Criteria (As per your setup) a. Add a Variable-Assign inside SBR (subroutine) apm policy agent variable-assign /Common/empty_act_variable_assign_ag { variables { { expression "mcget -secure {subsession.oauth.client.last.access_token}" secure true varname session.oauth.client./Common/oauth-aad-server.access_token } } }

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips