Skip to main content

Access Evo: Create and configure a Security Policy

Create and configure a Security Policy that enables me to set sessions, authentication, Two-Factor Authentication and Federation policies that are then applied to my users.

Updated over a week ago

Before you can create a Security Policy, you need to have a verified domain. If you are unsure how to do this, you can find support here - Access Evo: How do I become the owner of a domain?

Create a Security Policy

The first step towards creating a Security Policy is to sign in to Access Identity by visiting identity.access-workspace.com.au.

  1. Select Security Policies.

  2. In the Security policies section, select Add security policy.

  3. Enter a name for the Security Policy e.g. Example Security Policy.

  4. Add any additional Owners. Owners are able to modify this Security Policy.

  5. Configure the policy to your requirements.

  6. Scroll down, then select Save changes.

You've now created a new Security Policy. We now assign this to your Verified Domain.
​
Next, you need to assign the Security Policy to the Verified Domain. Security Policies need to be assigned to a Verified Domain so that the policy can be applied to your users.

Assign a Security Policy to a domain

Within Access Identity:

  1. Select Domains.

  2. In the Verified Domains section, select your Domain.

  3. Change the Security policy drop-list to the Policy you've created.

  4. Select Save changes.

You've now assigned the Security Policy to your Verified Domain.
​
Now that you've got the configuration in place, you can enable the Domain. Enabling the Domain cause this configuration to be applied to your users.

Enable the Domain

To enable the Domain:

  1. Select Domains.

  2. In the Verified domains section, select your Domain.

  3. Select Enabled then select Save changes.

You have now successfully set up and configured your Security Policy.
​
For further support on Two-Factor Authentication, Impersonation and more, you may wish to check out - Access Evo: Access Identity - An Advanced Guide

Did this answer your question?