Customizable conditional rules
You can customize the following set of conditional rules:
• | Tunnel Rule. For more information, see Tunnel rule. |
• | User Info Rule. For more information, see User Info Rule. |
• | Network Rule. For more information, see Network Rule. |
• | App Rule. For more information, see App Rule. |
• | Advanced Network Rule. For more information, see Advanced Network Rule. |
• | Multi-Factor Authentication: For more information, see Multi-factor Authentication |
• | Request Header Rule: For more information, see Request Header Rule. |
• | Desktop Trust Rule. For information, see Desktop Trust Rule. |
Tunnel rule
Add a Tunneled rule to control access for tunneled apps. The following describes the fields in the Tunnel Rule.
Item |
Description |
Name |
Enter a name for the rule. |
Description |
Enter descriptive text for the rule. |
Action |
From the drop down menu, select one of the following: Allow: Allows traffic from the specified Tunneled application. Block: Blocks traffic from the specified Tunneled application. Warn: Warns traffic from the specified Tunneled application. Follow Policy: Applies the conditional policy that you choose from the existing list. |
User Info Rule
Add a User Info Rule to control access for an user or an user group. By default, all the fields in the SAML assertion, including subject and any attributes are matched against the values specified in this rule.
• | Add attribute names in this rule if you want to match the values specified in this rule only to the attribute you specify here. |
• | If you want the values specified in this rule to match all attributes, use the attribute name "*". |
Values can be user IDs or group IDs. If you configure your Identity Provider to include a group ID to match against, it enables you to configure a small list of group IDs instead of a large list of individual user IDs.
Item |
Description |
||||||||||||
Name |
Enter a name for the rule. |
||||||||||||
Description |
Enter descriptive text for the rule. |
||||||||||||
SAML Assertion Field |
Select the SAML Subject checkbox if you want the UserInfoRule to match the SAML Subject. The default option is set to true. Enter the Attribute Name. For example, *.abcd. If the username or the group is part of the Attributes in the SAML response, then the Attribute name must be added here or the * must match with all of the attributes if any in the SAML response. |
||||||||||||
Match With |
From the drop-down menu, select one of the following:
|
||||||||||||
Action |
From the drop-down menu, select one of the following:
|
Network Rule
Add a Network Rule to control access from an IP network range. The following describes the fields in a Network Rule.
Item |
Description |
Name |
Enter a name for the rule. |
Description |
Enter descriptive text for the rule. |
Action |
From the drop down menu, select one of the following: Allow: Allows traffic from the specified IP address range. Block: Blocks traffic from the specified IP address range. Warn: Warns traffic from the specified IP address range. Follow Policy: Applies the conditional policy that you choose from the existing list. |
Start IP Mask or CIDR Network Address |
Enter the start address for the IP address range. The IP address can be in the form of an IPv4 address or CIDR. |
End IP Mask or CIDR Network Address |
Enter the end address for the IP range. The IP address can be in the form of an IPv4 address or CIDR. |
App Rule
Add an App Rule for an app or device platform to allow or block the app or device platform. The following describes the fields in an App Rule.
Item |
Description |
|||
Name |
Enter a name for the conditional rule. |
|||
Description |
Enter descriptive text for the conditional rule. |
|||
Action |
From the drop down menu, select one of the following: Allow: Allows traffic from the specified Application. Block: Blocks traffic from the specified Application. Warn: Warns traffic from the specified Application. Follow Policy: Applies the conditional policy that you choose from the existing list. |
|||
Matching Algorithm |
From the drop down menu, select one of the following: Regex: Select if you plan to use a regular expression for the user agent. Wildcard: Select if you plan to use wildcard for the user agent Literal: Select if the rule should exactly match the configured expression. |
|||
Expression |
Enter an expression for the app, based on the matching algorithm you selected.
|
|||
Case Sensitive |
Select if the rule should consider the case configured in the expression. |
|||
Partial Match |
Select if the rule can be applied to a partial match of the configured expression. |
Advanced Network Rule
Add an advanced network conditional rule to control access based on source IP and/or headers added by an HTTP proxy or load balancer. For more information, see https://community.mobileiron.com/docs/DOC-7127.
Figure 1. adding advanced network rule
The following describes the fields in an Advanced Network Rule.
Item |
Description |
||||||||||||
Name |
Enter a name for the conditional rule. |
||||||||||||
Description |
Enter descriptive text for the conditional rule. |
||||||||||||
Source IP Setting |
|||||||||||||
Source IP Ranges |
Select Upload to Replace to replace all the IP address with the IP address from the uploaded file. Upload a text file containing the IP addresses in CIDR format or the normal IP Address format. The maximum number of allowed entries of IP address(es) in the text file is 1000 for successful upload of IP address(es). |
||||||||||||
Excluded Source IP Ranges |
Exclude Source IP range is required when you have a large IP range that to configure for source IP and exclude subsets of that range from the consideration. For example: The rule must be configured for the range 192.168.0.0 – 192.168.0.255. However, you might not want IP ranges from this set. The IP ranges to be excluded are 192.168.0.0 – 192.168.0.3 and 192.168.0.8 – 192.168.0.11.
Procedure
You must upload a plain text file with each line containing an IP address or a CIDR network. The maximum number of IP range entries supported is 1000. |
||||||||||||
Configure Header Rule - Select the check-box to configure the Header Rule. By default, this checkbox is enabled. Deselect the checkbox to create a rule without headers. |
|||||||||||||
Header Rule Configuration |
|||||||||||||
HTTP Header |
Select one of the HTTP header types containing client IP addresses.
|
||||||||||||
Header IP Ranges |
You must upload a plain text file with each line containing an IP address or a CIDR network. The maximum number of IP range entries supported is 1000. |
||||||||||||
Ignored Header IP Ranges |
Use the Ignored Header IP Range when you have multiple proxies that always get added to the header.
You must upload a plain text file with each line containing an IP address or a CIDR network. The maximum number of IP range entries supported is 1000. |
||||||||||||
Action |
From the drop down menu, select one of the following: Allow: Allows traffic from the specified Application. Block: Blocks traffic from the specified Application. Warn: Warns traffic from the specified Application. Follow Policy: Applies the conditional policy that you choose from the existing list. |
Certain deployments masks an X-Forwarded-For header with Z-Forwarded-For before adding its own X-Forwarded-For header identifying the originating customer IP address. This prevents the internal IP addresses leaking out of the enforcement nodes. This provides the true static IP address of the user. Hence a request through the proxy will have a static IP address into X-Forwarded-For header. To set up the Advanced Network Rule that only leverages a static IP address as X-Forwarder-For header.
- Source IP Setting: 0.0.0.0/0
- Configure Header Rule (X-Forwarded-For) and upload a .txt file (including the static IP)
- Rule action: Allow
- Set the General bypass rule to Block.
All the source IPs are valid unless the IP matches, it is blocked by General bypass rule.
Multi-factor Authentication
For information about adding the multi-factor authentication rule, see Multi-factor Authentication with MobileIron Authenticator
Zero Sign-on Rule
For more information about adding the Zero Sign-on rule, see Fast Identity Online (FIDO2) or Zero Sign-on with MobileIron Access
Desktop Trust Rule
For information about adding a desktop trust rule, see the MobileIron Access Desktop Trust Agent Guide.
Request Header Rule
Add the Request Header Rule to match the value of a HTTP request header with a specified pattern. The Request Header rule is very similar to the App rule; however, you can select any header name other than just the User-Agent.
Use case: When the user has MobileIron Access federated with Microsoft ADFS and Office 365 and then tries to register a device, it gets blocked by the untrusted Apps on Windows 10 rule. If you use the Azure Domain integration, then the actual MDM registration is also done by Azure.
Due to the current policies, there is no option to allow device registrations on these Windows 10 devices except from allowing Edge.
The new Request Header Rule thus helps to match the value of any HTTP request header with a specified pattern.
Figure 2. request header rule
The following table lists the fields in a Request Header Rule:
Item |
Description |
|||
Name |
Enter a name for the conditional rule. |
|||
Description |
Enter descriptive text for the conditional rule. |
|||
Request Header Name |
Enter any appropriate header name such as User-Agent. |
|||
Matching Algorithm |
From the drop-down menu, select one of the following options: Regex: Select if you plan to use a regular expression the header name. Wildcard: Select if you plan to use wildcard for the header name. Literal: Select if the rule should exactly match the configured expression. |
|||
Expression |
Enter an expression for the app, based on the matching algorithm you selected.
|
|||
Case Sensitive |
Select if the rule should consider the case configured in the expression. |
|||
Partial Match |
Select if the rule can be applied to a partial match of the configured expression. |
|||
Remember decision across requests of a single login |
Select this checkbox to remember the action for the first request and to apply the same action for the rest of the requests. This action skips the rule evaluation for the remaining requests of SP login. |
|||
Action |
From the drop down menu, select one of the following: Allow: Allows traffic from the specified Application. Block: Blocks traffic from the specified Application. Warn: Warns traffic from the specified Application. Follow Policy: Applies the conditional policy that you choose from the existing list. |