This article addresses the situation in which an internal tool is used with an IP from one of the blocked countries configured via network zones in Okta. The tool needs to be unblocked, while the rest of the country should continue to be blocked.
- Network Zones
- Authentication Policies
To work around this issue, there are 2 options:
- Use sign-on/authentication policies to allow or restrict access to certain network zones.
-
-
Remove the targeted country from the Dynamic Blocking Zones.
-
Gather the IPs that need to be allowed and create a new IP network zone with them.
-
Create a sign-on policy rule that is set to allow access to the new IP zone.
-
Create a dynamic network zone that is set NOT to block the country that should be blocked.
-
Create another sign-on policy rule that includes the new dynamic zone and set it to deny if the IP matches that zone.
-
Make sure that the priority of the two new sign-on policy rules is in order as follows:
-
First sign-on policy rule with the IP zone that allows the IP.
-
The second sign-on policy rule with the dynamic zone denies access to the country that should be blocked.
-
-
(Optional) If the issue is not related to the IP location, create a dynamic zone that will block access to the specific country regions without blocking the IP region.
-
Results: The sign-on policy will now dictate which IPs are allowed or denied, rather than the network zone blocking the IPs immediately. The first sign-on policy rule will be evaluated first and will allow the internal service IP that was configured in the first network zone if the client matches that IP. If it does not match the second sign-on policy rule will be evaluated and will deny the user if their IP falls within the countries that were defined in the second network zone.
- Add the IPs to the IP exempt list (which by default is called DefaultExemptIpZone).
-
- Go to Security > Networks.
- Edit the IP exempt list and add the IPs/Gateways (please note that currently there is a limit of a maximum of 150 gateways that can be added to that Zone)
Results: This allows traffic from specific gateway IPs irrespective of Network Zones, Blocks, and ThreatInsight.
