Configure an app sign-on policy

App sign-on policies allow or restrict access to applications. To set up an app sign-on policy:

  1. From the Admin Console, go to the Applications > Applications.
  2. Click the desired app.
  3. Click the Sign On tab.
  4. Scroll down to the Sign On Policy section.
  5. Create a rule:
    1. Click Add Rule.
    2. Enter a name in the Rule Name field.
    3. Decide to whom the rule will apply by selecting an option under the People section.
      • Users assigned this app – Specify the users who are assigned this specific app.
      • The following groups and users – Assign the rule to groups or specific users who have been assigned the app.
    4. To exclude specific groups and users from the policy rule, select Exclude the following users and groups from this rule and then specify groups and users.
  6. Configure Conditions:
  7. Location — Specify the location to which you want the policy to apply. Available options are Anywhere, In Zone, or Not in Zone.

    If you select In Zone, enter the name of a zone. You configure zone names in Security > Network. For details, see Network.

    Client — Choose the conditions that you want to trigger the action(s) you configure in the Access section:

    • (Microsoft Office 365 apps only) Under If the user's client is any of these, select the client type(s) that you want to trigger the action(s) you configure in the Actions section (Web browser or Modern Auth client). For details, see Office 365 Client Access Policies.
    • Under And the user's platform is any of these, select the mobile and/or desktop platforms that you want to trigger the action(s) you configure in the Access section.

    Device Trust — Specify the trust status of the device that you want to trigger the action(s) you configure in the Access section. The Trusted and Not Trusted options are only selectable if Device Trust is configured in Security > Device Trust. Okta Device Trust determines devices to be trusted based on the presence of a trust signal (MDM enrollment; certificate; support for Universal Links).

  8. Configure the Actions that you want to enforce based on the conditions you specified in the Conditions section:
  9. Access:

    1. In the setting When all the conditions above are met, sign on to this application is select either Allowed or Denied.
    2. (SAML apps only) Select Prompt for re-authentication and specify how frequently you want users to be prompted to re-authenticate. The time period you specify begins from the moment the user last authenticated into Okta. This feature is available for all SAML-configured apps.

      Note: Because SWA apps do not support re-authentication, you cannot change the sign-on method from SAML to SWA if re-authentication is selected.

    3. Select Prompt for factor if you want to require users to choose an MFA option, and then specify how frequently you want users to be prompted. The Multifactor Settings link takes you to the Multifactor Authentication page, where you can choose your factor(s).
  10. Click Save.

Prioritize rules

Set rule precedence by clicking the blue arrows to set the priority number. A rule with a priority value of 1 has first priority and takes precedence over all other rules.

Manage rules

  1. To edit a rule, click the pencil icon and select the Edit rule option.
  2. To disable a rule, click the pencil icon and select the disable rule option.
  3. To delete a rule, click the X icon.ClosedScreenshot

User experience

If a user is blocked from an app, the following message will be displayed:

    Access to this application is not allowed at this time due to a policy set by your administrator.

    If you're wondering why this is happening, please contact your administrator.

    If it's any consolation, we can take you to your Okta home page.


Related topics

About app sign-on policies

About MFA enrollment policies

About password policies

About Okta sign-on policies

Configure an Okta sign-on policy

Configure an MFA enrollment policy

Configure a password policy