Add rules to a policy
Add rules to define the scope of resources and how to grant privileged access to these resources. The type of rule you can add depends on the policy type you've set up. The Okta service account policy only allows you to add rule types for Okta, while the default policy lets you add rules for any policy type except Okta.
Before you begin
- You must have an existing policy or be in the process of creating a policy. See Create or update a security policy.
- You must have a security admin or delegated security admin role
Add rules for a default policy
You can add this rule for server, secrets, SaaS app service accounts, or Active Directory accounts.
-
Go to .
- Select the policy where you want to add a rule.
- Select Add rule, and then select one of the rule type: Server rule, Secret rule, SaaS app service account rule, or Active Directory account rule
- Complete one of the following based on your selection in the previous step:
- Click Save rule. You can now publish this policy.
Configure server rule
If you selected Server rule, complete the following:
| Setting | Action |
|---|---|
|
Rule name |
Enter a rule name |
|
Select the resources that you want to protect with this rule |
You can select resources by label or by name. Based on your selection, you need to perform other configurations. Select servers by label
Select accounts by label
|
|
Enable session recording |
Optional. Okta resource admins must enroll and install a gateway before enabling session recording.
|
|
Approval requests |
Optional. Create a request type in Access Requests first for the access request workflow to be visible in the security policy. See Okta Privileged Access with Access Requests.
|
|
Permissions for accounts |
Optional. Click Reveal to enable users to decrypt the credentials of vaulted accounts and view them in plain text. |
|
Enable MFA |
Optional. Enable MFA to add a granular level of authentication and control within a policy.
After the policy is implemented, when a user tries to connect with a resource, they'll need to complete the necessary MFA steps. |
Configure secret rule
If you selected Secret rule, compete the following:
| Setting | Action |
|---|---|
|
Rule name |
Enter a rule name. |
|
Select the secret folder or secret you want to protect with this rule |
|
|
Select permissions |
Select the permissions. You must select at least one permission. See Secret permissions for details. |
|
Approval requests |
Create a request type in Access Requests first for the access request workflow to be visible in the security policy. See Okta Privileged Access with Access Requests.
|
|
Enable MFA |
Optional. Enable MFA to add a granular level of authentication and control within a policy.
|
Configure SaaS app service account rule
If you selected SaaS app service account rule, complete the following:
- Enter a rule name.
- Select one of the following password update methods:
- Automated
- Manual
- If you selected the Automated method, complete the following:
Setting Action Accounts to protect
You can select resources by label or by name. Based on your selection, you need to perform other configurations.
- Toggle on Select accounts by label.
- Click the Accounts dropdown list, and then add one or more labels.
- Toggle on Select resources by name.
- Select one or more accounts individually.
Approval requests
Optional. You must create a request type in Access Requests first so that the access request workflow is visible in the security policy. See Okta Privileged Access with Access Requests.
- Toggle on Enable approval requests.
- Select the approval request type.
- Choose how long you want the approval to last.
Permissions for accounts
Optional. Select at least one of the following:
- Reveal: Enables the user to decrypt credentials and view it in plain text.
- Rotate Password: Grants the user permission to rotate the password.
- Optional. Select Override Managed Password. This allows users to override the password to handle out-of-band password changes.
Enable MFA
Optional. Enable MFA to add a granular level of authentication and control within a policy.
- Toggle on Enable MFA.
- Select one of the following options: Any two-factor types or Phishing resistant.
- Select one of the following re-authentication frequencies:
- Every guarded action a user takes: Enforces MFA for each attempt to access the resource.
- After the specified duration: Specify a time duration between five minutes and 12 hours, with the default being 30 minutes.
After the policy is implemented, when a user tries to connect with a resource, they need to complete the necessary MFA steps.
Maximum checkout time
Optional. This time limit applies to any resources in this policy that has checkout enabled.
- Toggle on Override the project-level maximum checkout time.
- Set the Quantity and Unit.
- If you selected the Manual method, complete the following:
Setting Action Permission for accounts
Optional. Select at least one of the following:
- Reveal: Enables the user to decrypt credentials and view it in plain text.
- Update: Grants the user permission to change the credential value.
Accounts to protect
- Toggle on Select resources by name.
- Click the Accounts dropdown list, and then add one or more labels.
- Toggle on Select resources by name.
- Select one or more accounts individually.
Approval requests
Optional. You must create a request type in Access Requests first so that the access request workflow is visible in the security policy. See Okta Privileged Access with Access Requests.
- Toggle on Enable approval requests.
- Select the approval request type.
- Choose how long you want the approval to last.
Enable MFA
Optional. Enable MFA to add a granular level of authentication and control within a policy.
- Toggle on Enable MFA.
- Select one of the following options: Any two-factor types or Phishing resistant.
- Select one of the following re-authentication frequencies:
- Every guarded action a user takes: Enforces MFA for each attempt to access the resource.
- After the specified duration: Specify a time duration between five minutes and 12 hours, with the default being 30 minutes.
After the policy is implemented, when a user tries to connect with a resource, they need to complete the necessary MFA steps.
Configure Active Directory account rule
If the security policy is configured for a specific resource group, then both the Active Directory account and the server must belong to the same resource group. Otherwise, remote access through RDP fails, preventing successful connection.
If you selected Active Directory account rule, complete the following:
| Setting | Action |
|---|---|
|
Rule name |
Enter a rule name. |
|
Accounts to protect |
Shared Accounts by Name match any account by that name. The account doesn't need to exist and any account, now or in the future, which has that name is a match. When selecting specific accounts, you're actually selecting an exact account and SID. If the account is deleted and recreated in that domain with the same name but a different SID it will no longer be a match for this policy and would need to be reselected. |
|
Permissions for account |
Select at least one of the following options:
|
|
Session recording |
Optional. Okta resource admins must enroll and install a gateway before enabling session recording.
If you enable traffic forwarding and session recording, this condition applies to both RDP and SSH sessions. |
|
Approval requests |
Optional. You must create a request type in Access Requests first for the access request workflow to be visible in the security policy. See Okta Privileged Access with Access Requests.
|
|
Enable MFA |
Optional. Enable MFA to add a granular level of authentication and control within a policy.
After the policy is implemented, when a user tries to connect with a resource, they'll need to complete the necessary MFA steps. |
|
Maximum checkout time |
Optional. This time limit applies to any resources in this policy that has checkout enabled.
|
Add rules for Okta service account policy
Add this rule for Okta service accounts policy.
-
Go to .
- Select the policy where you want to add a rule.
- Select Add rule, and then complete the following:
Setting Action Rule name
Enter a rule name.
Accounts to protect
You can select resources by label or by name. Based on your selection, you need to perform other configurations.
Select accounts by name
- Toggle on Select accounts by name.
- Select one or more accounts individually.
Approval requests
Optional. You must create a request type in Access Requests first for the access request workflow to be visible in the security policy. See Okta Privileged Access with Access Requests.
- Toggle on Enable approval requests.
- Select the approval request type.
- Choose how long you want the approval to last.
Enable MFA
Optional. Enable MFA to add a granular level of authentication and control within a policy.
- Toggle on Enable MFA.
- Select one of the following options: Any two-factor types or Phishing resistant.
- Select one of the following re-authentication frequencies:
- Every guarded action a user takes: Enforces MFA for each attempt to access the resource.
- After the specified duration: Specify a time duration between 5 minutes and 12 hours, with the default being 30 minutes.
After the policy is implemented, when a user tries to connect with a resource, they'll need to complete the necessary MFA steps.
Maximum checkout time
Optional. This time limit applies to any resources in this policy that has checkout enabled.
- Toggle on Override the project-level maximum checkout time.
- Set the Amount and Duration.
- Click Save rule.
- Click Save policy. You can now publish this policy.
