IP zones

IP zones define network perimeters around a set of IP addresses. IP zones contain gateways and trusted proxies.

  • A gateway is an IP address that a request must pass through to gain access. When you add a gateway to your IP zone, a request's IP address must match the gateway to be considered within zone. Use gateways if you want to require IP addresses to match a zone exactly.

  • A trusted proxy is an intermediate server that provides information about a requesting client's IP address. Okta ThreatInsight doesn't block trusted proxies. The System Log doesn't record a user.session.context.change event if a user moves to an IP address in a trusted proxy. Keep in mind that it's your responsibility to designate which proxies are trusted. If you don't trust a proxy, add it to your zone as a gateway.

Default IP zones

You can create your own IP zones using individual IP addresses, IP ranges, or classless inter-domain routing (CIDR) notation. Okta also provides three default IP zones to support specific use cases.

  • The BlockedIpZone blocks all traffic from the IP addresses or IP address ranges you specify.

  • The DefaultExemptIpZone allows traffic from specific gateway IPs irrespective of Okta ThreatInsight configurations, blocked network zones, or IP change events within Identity Threat Protection with Okta AI. See IP exempt zone.

IP zone evaluation

Okta uses the IP chain to determine whether a request is from inside or outside an IP zone. The IP chain contains the IP addresses of all the network hops between the originating request and Okta.

  • If the IP chain contains a single IP that matches a defined gateway, the request is inside the zone.

  • If the IP chain has multiple IPs, but the last IP before Okta matches a defined gateway, the request is inside the zone.

  • If the IP chain has multiple IPs and the last one is a defined proxy, the system checks backwards through the chain until it finds a matching gateway IP. Then, the request is considered to be inside the zone. If it checks five IPs and finds no matching gateway, the request is considered outside the zone.

This table illustrates IP chain evaluation.

IP chain Gateway Proxy Request evaluation
1.1.1.1 1.1.1.1 Empty In zone
1.1.1.1 1.1.1.1 2.2.2.2 In zone
1.1.1.1 Empty Empty Out of zone
1.1.1.1 Empty 1.1.1.1 Out of zone
1.1.1.1, 2.2.2.2 2.2.2.2 Empty In zone
1.1.1.1, 2.2.2.2 2.2.2.2 3.3.3.3 In zone
1.1.1.1, 2.2.2.2 1.1.1.1 2.2.2.2 In zone
1.1.1.1, 2.2.2.2 Empty Empty Out of zone
1.1.1.1, 2.2.2.2 Empty 1.1.1.1 Out of zone
1.1.1.1, 2.2.2.2 Empty 2.2.2.2 Out of zone
1.1.1.1, 2.2.2.2 2.2.2.2 1.1.1.1 In zone

Traffic is considered to come from a trusted zone only when the gateway IP and the proxy IP are in the same zone.

Related topics

Create an IP zone

IP exempt zone