<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
How to Create Group-Based Exceptions for Dynamic Network Zone Block Lists
Administration
Okta Classic Engine
Okta Identity Engine
Overview

This article discusses whether it is possible to exclude specific groups of users from being blocked when configuring a Dynamic Network Zone in Okta, and the box Block access from IPs matching conditions listed in this zone is enabled.

 

Applies To
  • Dynamic Network Zone
Solution

The Dynamic Network Zone does not allow excluding specific users from the block list. When the box Block access from IPs matching conditions... is enabled, the blocking is applied at the org level for all incoming IPs.

To achieve fine-grain control over traffic to a tenant, a Dynamic Network Zone has to be created without the Block access from IPs matching conditions listed in this zone option selected. After configuring the Zone with countries from which traffic should not be allowed, they need to be associated with an Authentication Policy Rule with the Access is - Denied option selected.

  • Dynamic Zone configuration (select specific Countries, Regions/ States, or specify IP addresses that traffic should not come from)

Add dynamic zone    

  • Authentication Policy Rule - Example configuration for blocking access based on the Dynamic Network Zone.

Authentication Policy Rule  



Related References

Loading
How to Create Group-Based Exceptions for Dynamic Network Zone Block Lists