All Products
Search
Document Center

Identity as a Service:Access control policy

Last Updated:Mar 31, 2026

Conditional access policies control who can access which applications and under what conditions. Each policy is an if-then rule: if an access request matches all conditions, then IDaaS enforces the configured access decision (allow or deny, with optional two-factor authentication).

Two types of policies are available:

TypeWhat it doesCost
Default access control policySystem-provided policy that applies to all accounts and applications at the lowest priority. Controls two-factor authentication (MFA) behavior.Free
Custom access control policyLets you define specific conditions—application scope, visitor, and network—with a custom access decision.Requires Enterprise Edition IDaaS EIAM 2.0 + conditional access add-on. See Conditional access billing.

Key concepts

TermDescription
Access conditionThe set of criteria an access request must meet: accessible object (application), visitor (account), and limits (network scope). A policy is hit only if the request meets all conditions.
Access decisionThe action enforced when a policy is hit: allow access, deny access, or allow with two-factor authentication.
PriorityDetermines evaluation order when multiple policies exist. Valid values: 1–100. Lower value = higher priority. Only one policy is hit per access request. If no custom policy is hit, the default policy applies.

Prerequisites

Before you create a custom access control policy, make sure you have:

  • An IDaaS EIAM instance (Enterprise Edition 2.0)

  • The conditional access add-on purchased for the instance

Create a custom access control policy

Log on to the IDaaS console. On the EIAM page, click the IDaaS EIAM instance that you want to manage. In the left-side navigation pane, click Sign-In. On the Policy tab, click Add Policy.

You can create up to 10 custom access control policies.

image

Step 1: Enter basic information

image
FieldDescription
Policy NameDisplay name shown in the IDaaS console only.
PriorityEvaluation order relative to other policies. Valid values: 1–100. Lower value = higher priority.

Step 2: Specify an accessible object

An accessible object is the application this policy protects.

image
Application rangeWhen this condition is met
All ApplicationsAny application access triggers this condition.
Specific ApplicationOnly access to a selected application triggers this condition. Select the IDaaS Application Portal or an application created in the instance.

Step 3: Specify a visitor

A visitor is the account initiating the access request.

image
Visitor rangeWhen this condition is met
All AccountsAny account triggers this condition.
All GroupsIf the account is the name of a group, this condition is met.
Specific AccountOnly a selected account triggers this condition. Select directly by account, group, or organization.

To exclude specific accounts from matching this policy, use Exclude Visitors. Excluded accounts do not hit this policy regardless of other conditions.

image

Step 4: Specify limits

Set the network scope that visitors must access from.

image
Client CIDR blockWhen this condition is met
All IP AddressesAny network location triggers this condition.
Specific CIDR BlockOnly access from a CIDR block or IP address defined in your network scope triggers this condition. Use network scope to manage IP addresses dynamically without modifying the policy.

Step 5: Specify an access decision

When an access request meets all conditions, IDaaS enforces the access decision.

image
Access decisionBehavior
Allow AccessGrants access. Optionally configure two-factor authentication (MFA) requirements (see below).
Deny AccessBlocks access. If this policy targets the IDaaS Application Portal, users cannot log on to the portal. Configure with caution.

Two-factor authentication options under Allow Access:

OptionDescription
Select Two-factor Authentication Mode: Do Not Require Two-factor AuthenticationMFA is skipped; the account accesses the application directly.
Select Two-factor Authentication Mode: Custom Two-factor AuthenticationMFA is required. Select one or more methods in Select Two-factor Authentication Method; the account must pass at least one.
MFA Automatic PassIf enabled, once the account completes MFA within the same session, subsequent applications covered by the same policy skip MFA. For example, after passing SMS verification to access Application A, accessing Application B with the same policy requires no additional MFA.
Validity Period of MFA Automatic PassHow long MFA Automatic Pass remains valid. After this period, MFA is required again.
Important

If you set Access Policy to Deny Access for the IDaaS Application Portal, users cannot log on to the portal. Proceed with caution.

Note

A new or modified policy takes effect 3 minutes after the change is saved.

Step 6: Enable the policy

Custom policies are automatically disabled after creation to prevent accidental access disruption. After verifying your configuration, manually enable the policy on the Policy tab.

image

Delete a custom access control policy

Before deleting a policy, disable it first. After disabling, monitor user access to confirm no issues arise, then delete the policy. Deleted policies cannot be restored.

Default access control policy

The default access control policy applies permanently to all accounts and applications at the lowest priority. If no custom policy is hit, this policy takes effect—so every account and application is always covered.

Its scope and limits cannot be modified. To adjust two-factor authentication behavior, go to the Two-Factor Authentication page. For details, see Two-factor authentication.

Use cases

The following examples show how to combine policies for common access control scenarios.

Scenario: Allow access only from the office network

Configure two policies. Higher-priority Policy 1 allows access from your office CIDR block. Lower-priority Policy 2 denies access from any IP. Requests from outside the office miss Policy 1 and are denied by Policy 2.

Policy 1Policy 2
Priority12
Application rangeAll ApplicationsAll Applications
Visitor rangeAll AccountsAll Accounts
Client CIDR blockYour office CIDR blockAll IP Addresses
Access decisionAllow AccessDeny Access
ResultRequests from office IPs are allowed.All other requests are denied.

Scenario: Require WebAuthn for a specific application

Policy 3
Priority1
Application rangeSpecific Application
Visitor rangeAll Accounts
Client CIDR blockAll IP Addresses
Access decisionAllow Access
Two-factor Authentication ModeCustom Two-factor Authentication → WebAuthn
ResultUsers must authenticate with WebAuthn (fingerprint or facial recognition) to access this application.

For setup, see WebAuthn logon.

Scenario: Require MFA on every SSO for a sensitive application

Policy 4
Priority1
Application rangeSpecific Application
Visitor rangeAll Accounts
Client CIDR blockAll IP Addresses
Access decisionAllow Access
Two-factor Authentication ModeCustom Two-factor Authentication
MFA Automatic PassCleared (disabled)
ResultMFA is required for every single sign-on (SSO) operation. MFA Automatic Pass is off, so each access requires a new MFA challenge.

Scenario: Different access rules for different groups

Policy 5 (Group A)Policy 6 (Group B)
Priority11
Application rangeAll ApplicationsAll Applications
Visitor rangeGroup AGroup B
Client CIDR blockAll IP AddressesAll IP Addresses
Access decisionAllow AccessAllow Access
Two-factor Authentication ModeCustom Two-factor Authentication
ResultGroup A accesses without MFA.Group B must complete MFA.