Access Rules

Access Rules

Access control rules are used to allow access to specific Applications or Application Groups from particular Users or User Groups. These are identity based rules that permit access on the basis of the Role of the users in the organization as opposed to parameters like source IP address. The guides below will assist you with creating a new Access Rule.





    • Related Articles

    • Configuring Access Rules

      The Access Rules page on the ISA web portal allows administrators to define rules to allow or deny remote user access to corporate resources. referenced in access rules. The following types of access rules can be created: Allow or deny access to an ...
    • User Groups

      Users in InstaSafe Secure Access can be logically grouped based on their roles in the organization. This makes it easier to administer security policies and define access rules. The guides below will assist you with creating a new User Group.
    • Application Groups

      InstaSafe Secure Access allows you to group Applications and the corresponding Application Services you wish to allow into Groups for ease of management and defining Access Rules. The guides below will assist you with creating a new Application ...
    • Device Checks

      InstaSafe Secure Access allows you to define rules that would validate the devices for certain mandatory compliance which would govern whether or not the device is allowed to connect. Thus, non-compliant endpoints are prevented from connecting and ...
    • Contextual Access Management

      Contextual access in the context of enterprise remote access refers to the concept of granting or restricting access to resources based on various contextual factors. Instead of relying solely on traditional methods like username and password, ...