Permitting access based on a set of conditions with an AND clause
A common policy scenario is to use multiple conditions in a single rule and to join those conditions with And or Or. In this scenario, access is permitted if both of the policy conditions that are joined by And are true.
Use the steps in this scenario task to create a policy that permits access if both of the following conditions are true:
- The calculated risk score is less than or equal to a value of 40.
- The reputation of the ipAddress in the request is not considered malware.
Steps
- Log in to the local management interface.
- Click AAC.
- Under Policy, click Access Control.
- In the center panel, click .
- Enter a name for the policy.
- In the Rules section, set the Precedence property to Permit. As a result, access is permitted if any rule returns permit.
- Click Add Rule.
- Click If all are true. The rule evaluates to true if all of the conditions in the rule are true.
- Select riskScore from the attribute list.
- Select <= as the operator.
- Type 40 as the value.
- Click to add another condition to the rule.
- Select ipReputation from the attribute list.
- Select has member as the operator.
- Type Malware as the value.
- Click to convert the condition to a Not condition.
- In the Decision list, select Permit.
- Click OK to complete the rule.
- Click the arrow next to Add Rule.
- Click Unconditional rule.
- In the Decision list, select Deny. The unconditional Deny rule causes the policy to deny access if none of the permit access rules evaluate to true.
- Click OK.
This scenario uses the following settings in the policy editor.
- Precedence: Permit
- Attributes: Optional
- Rule 1: If riskScore <=40 and not (ipReputation has member Malware) Then Permit
- Rule 2: Deny
Parent topic: Policy scenarios