Adding Policy Rules

The Policy Screen

Axis evaluates Policy Rules to specific Destinations (Applications or Application Tags) on a first-match principle. For instance, when a user attempts to access a specific application, Axis begins evaluating all of the configured policies starting with the first rule in a set of policy rules. As soon as it finds a policy that matches the criteria that were specified in a rule, it enforces that policy rule and disregards all other rules that follow, including any lower-priority or conflicting rules. If no rule was matched, the default rule is chosen which is always set to "Block".

Adding a Rule

A rule consists of a set of policy objects called Conditions.

To add a rule, complete the following steps:

  1. In the management console, go to Policy -> Rules -> New Rule.

  2. Enter the rule name in the Name field.

  3. (Optional) Enter a description in the Description field.

  4. Click the box next to Make this rule temporary if you want to create a temporary rule. Select a date and time range.

  5. In the Conditions section, configure the following as necessary:

    • Identity—Select an identity from the drop-down menu or click the add icon to use an Okta identity, Axis IdP identity, custom SAML Query, or identity group.
    • Origin—Select an origin from the drop-down menu or click the add icon to add an IP range or location that users can access. Select a geolocation to restrict users restrict from only accessing resources from a location. For example, Germany
      📘

      Note:

      The Locations tab in the drop-down menu displays all sub-locations with the same name as one entry, even if the name is defined under multiple locations. Selecting a sub-location name selects all sub-locations with that name across your tenant.
      For more information on sub-locations with same names, see Sub-Locations with the Same Name Across Locations.

    • Device Posture—Select a device posture from the drop-down menu or click add to add an Atmos Agent Posture or a Client Certificate. For information on Atmos Agent Posture, see Atmos Agent Device Prerequisites. To have a condition that is applied to Mac and Windows OS on the same rule:
      • Apply an “OR” condition between the Mac and Windows OS since there will never be an “AND” condition.
      • Create a rule that is Windows-specific and another rule that is Mac-specific.
      • Combine rules by choosing both.
    • Time Range—Select a time range from the drop-down menu or click the add icon to add a new time range. Configure a time range that users can access a protected resource.
  6. Configure the Match Criteria parameters as follows:

    • To configure the rule as an Application rule, complete the following steps:
      1. In the Match Criteria section, select Application.
      2. In the Destination field, select an option from the drop-down menu.
    • To configure the rule as an Network rule, complete the following steps:
      1. In the Match Criteria section, select Network.
      2. In the Protocol field, select an option from the drop-down menu.
      3. Enter the source IP in the Source field, select a preset source IP from the drop down menu.
      4. Enter the source port range in the Source Ports field, or select a preset range from the drop down menu.
      5. Enter a destination IP in the Network Destination field.
      6. Enter the destination port range in the Destination Ports field, or select a preset range from the drop down menu.
        📘

        Note:

        If the Protocol field is left blank, or set to the default Any setting, the Source Ports and Destination Ports fields are not displayed.

  7. Under the Action section, select whether the rule blocks or allows access.

  8. In the Profiles section, complete either of the following steps: select a profile from the drop-down menu or click add to add a profile, for the corresponding profile fields as applicable.

    • For a Network rule:
      • Select a client security profile in the the External Web (Agent) field, or click the corresponding plus icon to add a client security profile.
      • Select a file security profile in the File Security (Agent, Agentless) field.
    • For an Application rule:
      • Select a RDP profile from the drop-down menu in the RDP (Agent) field.
      • Select a SSH profile from the drop-down menu in the SSH (Agent) field.
      • Select a web profile from the drop-down menu in the Self-Hosted Web Application (Agent) field.
      • Select a Git profile from the drop-down menu in the Git (Agent) field.
      • Select a SSH range profile from the drop-down menu in the SSH Range (Agentless) field.
      • Select a client security profile from the drop-down menu in the External Web (Agent) field.
      • Select a file security profile from the drop-down menu in the File Security (Agent, Agentless) field.
        📘

        Note:

        To add a new profile, click the plus icon corresponding to the field of the profile to be added.

  9. Click Submit.

📘

Note

To commit your changes, navigate to the top-right menu, click Apply Changes, then select Commit Changes.