Here, you manage the general access rules that can be applied to resources. Access rules define specific requirements for access. The requirements can be used in combination.
You can also create access rules specifically for individual resources, on the Access Rules add step in wizards and on the Access Rules tab. It is also possible to specify global access rules, that are automatically applied to all resources, in the Manage Global Access Rules section of the Administration Interface.
The access rules you register are displayed in a list. Note that although it is not visible on this page, the access rule Public is predefined in the system. When the access rule Public is applied, the resource is available to any anonymous users.
You create access rules using different types (or criteria):
Access Rule |
Description |
Access to resource is allowed if user is authenticated with one or several authentication methods. If several authentication methods the entities can be combined with both AND and OR. |
|
Access to resource is allowed if the user is member in a certain user group. If several user groups are selected, the entities can be combined with both AND and OR. |
|
Access to resource is allowed if the incoming client comes from a specific IP address or range of IP addresses. |
|
Access to resource is allowed if user uses a specific device, for example Web or WAP. |
|
Access to resource is allowed if the access occurs during a specified time period. |
|
Access to resource is allowed if client meets assessement requirement |
|
Access to resource is allowed if user is stored in a specified user storage location. |
|
Access to resource is allowed if the request is coming through a specified Access Point. |
|
Select from registered SAML 2.0 identity providers. Identity providers are managed on the Manage SAML settings page. |
|
Access to resource is allowed if user is orchestrated to remote system using an Identity Orchestration channel |
|
HTTP Header request specific rules to access the resource. |
|
Customized after the customer’s needs, specified in separate XML files. One file is stored for each access rule. Updating the customized access rule can only be done in the XML file. |