
NeilC.50012 (Customer) asked a question.
I have tried a number of different methods to restrict inbound IP addresses on an OIDC application with no luck. I have added a zone and created a rule. Applying one or both of these does not result in users getting blocked from authenticating through OKTA on IP addresses outside of the range I provided.
How can I set an IP range in an OIDC application and ensure that any user outside of that range cannot authenticate through the OKTA app

The answer here is that when you create a zone and then go to create your rules in your SAML or OIDC app, you need to create two rules each time. One rule for allow and one rule for deny