You can add identity provider rules to an identity provider policy in an identity domain.
By adding identity provider policy rules, you can prevent some identity providers from being available to users to authenticate into the identity domain. Or you can allow other identity providers to be available only to those users who access the identity domain from an IP address contained in a network perimeter.
-
On the Identity provider (IdP) policies list page, select the policy to add provider rules to. If you need help finding the list page, see Listing Identity Provider Policies.
-
Perform one of the following actions depending on the options that you see:
- Select Identity provider rules.
- Under Resources, select Identity provider rules.
-
Select Add IdP rule.
-
Enter a Rule name for the identity provider rule.
-
Use the Assign identity providers menu to select the
identity providers to assign to this rule.
-
Under Conditions, provide the following values:
-
Expression placement: Select one of the
following values:
- Starts with expression: This rule
evaluates the start of the username in the user account.
- Ends with expression: The rule evaluates
the end of the username in the user account.
-
Enter user name expression: Specify information about users' usernames to evaluate whether they meet the criteria of the rule. For example, if you want the rule to be applicable only to those users that have usernames that end with @example.com
, then select Ends with expression from the dropdown menu, and enter @example.com in the Enter user name expression text box.
-
Exclude users: Optionally, enter or select
the users to exclude from the rule.
-
Group membership: The identity providers that you specify in this rule are available to all users that are members of the group.
-
Filter by client IP address: Select one of
the following options:
- Anywhere: The identity providers that you specify in this rule are available to users that sign in from any IP address.
- Restrict to the following network perimeters: A text box appears. In this text box, enter or select network perimeters that you defined. For more information, see Creating a Network Perimeter. The identity providers that you specify in this rule are available to users that sign in using only IP addresses that are contained in the defined network perimeters.