Access Conditions are rules and conditions that evaluate an Access Policy and determine whether a Client Workload should receive access to a Server Workload. Whenever the system receives a request for access to an Access Policy and/or Credential, these Access Conditions validate and verify the request.
If validation passes, the system grants the request; however, if validation fails, the system denies the request. For an Access Condition to validate and verify a request, administrators must already establish an existing integration and create an Access Policy.
Available Access Conditions
Section titled “Available Access Conditions”- Geo-IP-based Conditions - Control access based on geographic location using IP address geolocation.
- Time-based Conditions - Enforce access restrictions based on time of day, day of week, or specific date ranges.
- CrowdStrike Conditions - Integrate with CrowdStrike to evaluate the security posture of Client Workloads and enforce access based on threat intelligence.
- Wiz Conditions - Leverage Wiz security posture assessments to ensure Client Workloads meet compliance and security requirements.
Available security tool integrations
Section titled “Available security tool integrations”- CrowdStrike - Integrates with CrowdStrike to evaluate endpoint security posture.
- Wiz - Integrates with Wiz to assess cloud security posture.