Skip to main content

Access Policy

Access Policy Overview

This section is used to create more flexible access policies to apply to the Access Control rules from the previous section. Where the Access Control is limited to only users, the Access Policies can utilize a combination of IP addresses, Time, Geolocation, browsers and operating system to create more complex conditional rules to allow or block users from accessing ZTNA tunnels.

image.png

The following information is provided to give guidance on the purpose of each section:

SearchAllows for filtering of the different Access Policies based on a variety of different fields
CheckboxUsed in conjunction with the delete button in order to delete one or multiple selected policies.
CreateOpens the create menu in order to create a new access policies.

Configuring Access Policy

image.png

The following information is provided to give guidance on the purpose of each section:

AttributeAttribute informationValue Information
UserDetermines which users will be affected by the policySelect from a list of all possible users, the list is separated into user groups
ScheduleSets a single or reoccurring start and end time (Based on time zone) for the policy to be active during.Select the date/day, time in hours, minutes sections for both the start and end time.
IPA list of IP addressed, using the in condition, if the IP is on the list it will have the rule appliedMust be in a valid IP address format between 0.0.0.0 - 255.255.255.255
CountryUsing Geolocation information checks the location of the user in order to apply the conditionSelect from a list of all possible country locations.
BrowserUsing the browser header information, checks the browser type to check as a conditionSelect from a list of available browsers.
Operating SystemUsing the OS information found in the header checks the OS typeSelect from a list of available operating systems.

After an access policy has been created, it must then be applied to a rule in the Access Control menu.

ZTNA > Access Control

image.png

image.png

After applying the Policy to the Access Control rule, the more granular rules from the Policy will now apply. In the example above, the ZTNA rule will now enforce no Opera, Firefox, or Internet Explorer when accessing ztna.web.test.