Add access control rules
In Enterprise Center for Enterprise Application Access you can create an access control rule to block or deny access to an application based on the criteria listed in the below table.
Access control type | Description |
---|---|
URL | The web address or path requested by the user.
Note: This access control type is available with HTTP/HTTPS applications only. |
Group | The group that a user belongs to. |
User | The username assigned to the user |
Method | An HTTP method such as GET, POST, PUT, DELETE, HEAD, OPTIONS, TRACE, CONNECT, or an Other method for any custom method that is used for the application. |
Client IP | The IP address of the client that you want to restrict |
Country | The country where you want to prevent the user from accessing the application. |
Time | The days of the week and the exact times (based on time zone) that you want to restrict access.
Note: This access control type is available with HTTP/HTTPS applications only. |
App Host | The hostname of the application server. Applies to tunnel-type client-access applications only. |
App Port | The port number of the application server. Applies to tunnel-type client-access applications only. |
App Protocol | Select TCP or UDP protocol. Applies to tunnel-type client-access applications only. |
Device Risk Tier | Set the risk tier to Medium or High, High, or Unmanaged levels.
Note: Available only if you have access to Device Posture. |
Device Risk Tag | Set the risk tag to iOS Device, Windows PC, Browser, OS, or CS Status Check.
Note: Available only if you have access to Device Posture. |
For every rule you create, you select the access control type, an operator, and then define the values for the selected type. You can choose whether an operator is
or is not
is restricted as a control type.
These conditions also apply to rules:
- By default, access control rules are disabled for an application. You must enable the feature and then configure the rules and the criteria you require.
- A rule can contain one criterion or multiple criteria. The criteria you provide in a rule are combined with an
AND
operator. For example, with the following criteria, the conditions are combined to block User A from accessing the application from 1am to 2 am on a Saturday.
- If multiple rules are created for an application, these rules are combined with the
OR
operator. This allows you to use the same control types in multiple expressions and ensure there is no conflict.
For example, as shown in the Figure, if User A attempts to access the application between 1 am and 2 am or 11 pm and 12 am EST on a Saturday, they are denied access.
After you save the rules, the combined rule appears as:
- The criteria you create in a rule are combined with an
AND
operator. This means that all conditions are applied to deny access. If you configure multiple rules, the rules are applied with anOR
operator to ensure that if any of the conditions in a rule apply, access to an application is denied. - Access control rules are not applied to an application until you deploy the application. If you make changes to the access control rules, after an application is deployed, you must re-deploy the application for the new rules to apply.
When a user is denied access as a result of an access control rule, by default, an HTTP 403 Forbidden
error message appears. See Application response codes, login events, and errors.
If you want to redirect the user to a custom URL page when access to an application is denied due to an ACL (excluding Device Posture tiers, tags, or versions) , you can configure authorization failure redirect options in the advanced settings of the IdP. Or, if you redirect the user to a custom EAA Access Denied Page, when access to an application is denied due to an ACL, you can configure a custom EAA access denied page in the advanced settings of the IdP.
Note
- Using ACL with custom URL or custom access denied page, is not supported if you use Device Posture Risk Tier or Risk Tag in your ACL.
- Using ACL with custom URL or custom access denied page, only works with Akamai IdP. It is not supported on third party IdP.
Note:
You can add access control rules for an Application.
Or alternatively,
You can also try out adding Access Ruleset to Application Access Groups. For more information, see our Beta feature, Connector Pools, Application Access Groups (AAG).
- Log in to Enterprise Center.
- In the Enterprise Center navigation menu, select Application Access > Applications > Applications.
- Locate the application you want to configure ACL for.
- Click Access tab, enable Access option.
a. To create a new rule, click Add Rule (+).
b. To edit an existing rule, click Edit Rule.
A modal window appears.
-
Enter a name for the rule and click Add.
-
Select a Type for the ACL. See Access Control Type table above.
-
In Operator select either
is
oris not
. -
In Value enter the value if applicable or select the value for the access control type.
a. Click Time to configure the time-based settings.
b. In Start Time and End Time enter a time in hh:mm, AM-PM format.
c. In time zone select a timezone.
d. Select the days of the week that you want to deny access.
e. Click Save Rule (✓).
The rule appears as Access Control in the Services column. -
To add another criterion to the rule click Add Criteria (+), and repeat the above steps.
-
To delete the rule, click the Delete Rule (trash icon), and click Delete.
-
To edit the rule, click the Edit Rule (pencil icon), and make the edits, and click Save Rule.
-
Click Back to Configuration Services, and save these changes.
-
Click Save and Deploy, to make these changes to go into effect.
-
(optional) If you want to set up a custom EAA Access Denied Page for access denied due to ACL, you can configure a custom EAA access denied page in the advanced settings of the IdP.
-
(optional) If you want to redirect the user to a custom URL page when access to an application is denied due to an ACL, you can configure authorization failure redirect options in the advanced settings of the IdP.
Note: If you do not configure 14, 15, when the user is denied access to the application due to ACL, they will see HTTP 403 Forbidden message.
Updated 2 months ago