Manage Access policies
Access policies are properties of applications. When setting up an Access application, you will be prompted to create at least one policy for the application. You can go back and create, edit, or delete policies at any time.
To create an Access policy for an existing application:
- In Zero Trust ↗, go to Access > Applications.
- Locate the application for which you want to create the policy and select Edit.
- Select Add a policy.
- Enter a Policy name. This name will identify your policy in the list of application policies.
- Choose an Action for the policy.
- Configure as many Rules as needed.
- Select Add policy.
- Rearrange the rows in the policy table to match your desired order of precedence.
- Select Save application.
Your new policy is now in effect.
To make changes to an existing policy:
- In Zero Trust ↗, go to Access > Applications.
- Locate the application for which you want to change the policies and select Edit. You will see a list of existing policies.
- Locate the policy you want to update and select Edit.
- Once you have made the necessary changes, select Save policy.
- Select Save application.
The updated policy is now in effect.
To delete an Access policy:
- In Zero Trust ↗, go to Access > Applications.
- Locate the application for which you want to delete the policy and select Edit. You will see a list of existing policies.
- Locate the policy you want to delete and select Delete.
- A pop-up message will ask you to confirm your decision to delete the policy. Select Delete.
- Select Save application.
Your policy has now been deleted.
You can test your policies against an existing user identity to see if they would be granted access. For the policy tester to work, the user must have logged into the App Launcher or any other Access application at some point in time.
To check if a user has access to an application:
- In Zero Trust ↗, go to Access > Applications.
- Locate the application you want to test and select Edit.
- Select Test your policies.
- Enter the user’s email address and select Check user.
The policy tester reports the following information:
- Whether the user is allowed or denied access to the application based on all configured policies.
- The user’s identity from their most recent Access login attempt.
- Whether the user matches individual Allow, Block, or Bypass policies.