You can add identity provider rules to an identity provider policy in an identity domain.
By adding identity provider policy rules, you can prevent some of your identity
providers from being available to users to authenticate into the identity domain. Or
you can allow other identity providers to be available only to those users who
access the identity domain from an IP address contained in one of your network
perimeters.
-
Select Identity provider rules.
-
Select Add IdP rule.
-
Enter a Rule name for the identity provider rule.
-
Use the Assign identity providers menu to select the
identity providers to assign to this rule.
-
Under Conditions, provide the following values:
-
Expression placement: Select one of the
following values:
- Starts with expression: This rule
evaluates the start of the username in the user account.
- Ends with expression: The rule evaluates
the end of the username in the user account.
-
Enter user name expression: Specify
information about users' usernames to evaluate to determine whether
they meet the criteria of the rule. For example, if you want the
rule to be applicable only to those users that have usernames that
end with @example.com
, then select Ends
with expression from the drop-down menu, and enter
@example.com in the Enter user
name expression text box.
-
Exclude users: Optionally, enter or select
the users to exclude from the rule.
-
Group membership: The identity providers that you specify in this rule will be available to all users that are members of the group.
-
Filter by client IP address: Select one of
the following options:
- Anywhere: The identity providers that you
specify in this rule will be available to users that sign in
from any IP address.
- Restrict to the following network
perimeters: A text box appears. In this text
box, enter or select network perimeters that you defined. For
more information, see Creating a Network Perimeter.
The identity providers that you specify in this rule will be
available to users that sign in using only IP addresses that are
contained in the defined network perimeters.