Configure an app sign-on policy

App sign-on policies allow or restrict access to applications. To set up an app sign-on policy:

  1. In the Admin Console, go to Applications > Applications.
  2. Click the desired app.
  3. Click the Sign On tab.
  4. Scroll down to the Sign On Policy section.
  5. Create a rule:
    1. Click Add Rule.
    2. Enter a name in the Rule Name field.
    3. Decide to whom the rule will apply by selecting an option under the People section.
      • Users assigned this app – Specify the users who are assigned this specific app.
      • The following groups and users– Assign the rule to groups or specific users who have been assigned the app.
    4. To exclude specific groups and users from the policy rule, select Exclude the following users and groups from this rule and then specify groups and users.
  6. Configure Conditions:
  7. Location — Specify the location to which you want the policy to apply. Available options are Anywhere, In Zone, or Not in Zone.

    If you select In Zone, enter the name of a zone. You configure zone names in Security > Network. See Network Zones and About dynamic zones.

    Client — Choose the conditions that you want to trigger the action(s) you configure in the Access section:

    • (Microsoft Office 365 apps only) Under If the user's client is any of these, select the client type(s) that you want to trigger the action(s) you configure in the Actions section (Web browser or Modern Auth client). For details, see the Client section in Office 365 Client Access Policies.
    • Under And the user's platform is any of these, select the mobile and/or desktop platforms that you want to trigger the action(s) you configure in the Access section.

    Device Trust — Specify the trust status of the device that you want to trigger the action(s) you configure in the Access section. The Trusted and Not Trusted options are only selectable if Device Trust is configured in Security > Device Trust. Okta Device Trust determines devices to be trusted based on the presence of a trust signal (MDM enrollment; certificate; support for Universal Links).

  8. Configure the Actions that you want to enforce based on the conditions you specified in the Conditions section:
  9. Access:

    1. In the setting When all the conditions above are met, sign on to this application is select either Allowed or Denied.
    2. (SAML apps only) Select Prompt for re-authentication and specify how frequently you want users to be prompted to re-authenticate. The time period you specify begins from the moment the user last authenticated into Okta.

      Note:

      • A 10-second grace period applies after a user authenticates with their password. During this grace period, users will not be prompted for their password again if Every sign-in attempt is selected under Re-authentication frequency.
      • This feature is available for all SAML-configured apps.
      • Because SWA apps do not support re-authentication, you can't change the sign-on method from SAML to SWA if re-authentication is selected.
    3. Select Prompt for factor if you want to require users to choose an MFA option, and then specify how frequently you want users to be prompted. The Multifactor Settings link takes you to the Multifactor Authentication page, where you can choose your factor(s).
  10. Click Save.

Prioritize rules

Set rule precedence by clicking the blue arrows to set the priority number. A rule with a priority value of 1 has first priority and takes precedence over all other rules.

Manage rules

  1. To edit a rule, click the pencil icon and select the Edit rule option.
  2. To disable a rule, click the pencil icon and select the disable rule option.
  3. To delete a rule, click the X icon.ClosedScreenshot

User experience

If a user is blocked from an app, the following message appears:

    Access to this application isn't allowed at this time due to a policy set by your administrator.

    If you're wondering why this is happening, please contact your administrator.

    If it's any consolation, we can take you to your Okta home page.

Related topics

About app sign-on policies

About MFA enrollment policies

About password policies

About Okta sign-on policies

Configure an Okta sign-on policy

Configure an MFA enrollment policy

Configure a password policy