Skip to content

Access Conditions are rules and conditions that evaluate an Access Policy and determine whether a Client Workload should receive access to a Server Workload. Whenever the system receives a request for access to an Access Policy and/or Credential, these Access Conditions validate and verify the request.

If validation passes, the system grants the request; however, if validation fails, the system denies the request. For an Access Condition to validate and verify a request, administrators must already establish an existing integration and create an Access Policy.

  • Geo-IP-based Conditions - Control access based on geographic location using IP address geolocation.
  • Time-based Conditions - Enforce access restrictions based on time of day, day of week, or specific date ranges.
  • CrowdStrike Conditions - Integrate with CrowdStrike to evaluate the security posture of Client Workloads and enforce access based on threat intelligence.
  • Wiz Conditions - Leverage Wiz security posture assessments to ensure Client Workloads meet compliance and security requirements.
  • CrowdStrike - Integrates with CrowdStrike to evaluate endpoint security posture.
  • Wiz - Integrates with Wiz to assess cloud security posture.