<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
How to Allow Access the Okta Org Only from a Specific IP Range
Okta Classic Engine
Okta Identity Engine
Administration
Overview

Admins can leverage network zones and policies to restrict access to Okta to a specific IP range (for example, corporate network, VPN, etc.).

NOTE: This will only block a session from being created. The login pages will still be accessible, so denial-of-service attacks are still a risk with this configuration. In order to completely limit access to a specific list of IPs, please contact Okta Support.

Applies To
  • Network Zones
  • Sign-On Policy
  • Global Session Policy
Solution

Before configuring the policies, the allowed IPs must be added to a network IP zone. This can be done in Security > Networks.

Networks

 


Okta Classic Engine

  1. Navigate to Security > Authentication > Sign On.

  2. Create a new Sign On Policy and assign it to the Everyone group (or target group).

  3. Create a rule to allow authentication if the request is coming from within the configured network zone. This will be the first rule in the priority list.
    Add zone 

  4. Create a second rule that denies access requests coming from outside the network zone. This will be the second in the evaluation priority list.
    Access is Denied 

 


Okta Identity Engine

  1. Navigate to Security > Global Session Policy.

  2. Create a new policy and assign it to the Everyone group (or target group).

  3. Create a rule to allow authentication if the request comes from within the configured network zone. This will be the first rule on the priority list.
    Policy Settings 

  4. Create a second rule that denies access for requests coming from outside the network zone. This will be the second rule on the evaluation priority list.
    Policy Settings 

NOTE: It is highly recommended to create another policy on top of the denying one that will allow at least one Super Administrator to access the tenant from anywhere. This will offer a backdoor in case the configured IP range becomes inaccessible.

Related References

 
Loading
How to Allow Access the Okta Org Only from a Specific IP Range