Configure an app sign-on policy
App sign-on policies allow or restrict access to applications. To set up an app sign-on policy:
- From the Admin Console, go to the Applications > Applications.
- Click the desired app.
- Click the Sign On tab.
- Scroll down to the Sign On Policy section.
- Create a rule:
- Click Add Rule.
- Enter a name in the Rule Name field.
- Decide to whom the rule will apply by selecting an option under the People section.
- Users assigned this app – Specify the users who are assigned this specific app.
- The following groups and users– Assign the rule to groups or specific users who have been assigned the app.
Location — Specify the location to which you want the policy to apply. Available options are Anywhere, In Zone, or Not in Zone.
If you select In Zone, enter the name of a zone. You configure zone names in Security > Network. For details, see Network.
Client — Choose the conditions that you want to trigger the action(s) you configure in the Access section:
- (Microsoft Office 365 apps only) Under If the user's client is any of these, select the client type(s) that you want to trigger the action(s) you configure in the Actions section (Web browser or Modern Auth client). For details, see Office 365 Client Access Policies.
- Under And the user's platform is any of these, select the mobile and/or desktop platforms that you want to trigger the action(s) you configure in the Access section.
Device Trust — Specify the trust status of the device that you want to trigger the action(s) you configure in the Access section. The Trusted and Not Trusted options are only selectable if Device Trust is configured in Security > Device Trust. Okta Device Trust determines devices to be trusted based on the presence of a trust signal (MDM enrollment; certificate; support for Universal Links).
- In the setting When all the conditions above are met, sign on to this application is select either Allowed or Denied.
- (SAML apps only) Select Prompt for re-authentication and specify how frequently you want users to be prompted to re-authenticate. The time period you specify begins from the moment the user last authenticated into Okta.
- A 10-second grace period applies after a user authenticates with their password. During this grace period, users will not be prompted for their password again if Every sign-in attempt is selected under Re-authentication frequency.
- This feature is available for all SAML-configured apps.
- Because SWA apps do not support re-authentication, you can't change the sign-on method from SAML to SWA if re-authentication is selected.
- Select Prompt for factor if you want to require users to choose an MFA option, and then specify how frequently you want users to be prompted. The Multifactor Settings link takes you to the Multifactor Authentication page, where you can choose your factor(s).
Set rule precedence by clicking the blue arrows to set the priority number. A rule with a priority value of 1 has first priority and takes precedence over all other rules.
- To edit a rule, click the pencil icon and select the Edit rule option.
- To disable a rule, click the pencil icon and select the disable rule option.
- To delete a rule, click the X icon.Screenshot
If a user is blocked from an app, the following message appears:
Access to this application is not allowed at this time due to a policy set by your administrator.
If you're wondering why this is happening, please contact your administrator.
If it's any consolation, we can take you to your Okta home page.