Proxy Rules
You can access this page from the Configuration > Proxy Rules tab. On this page, you can view or manage the list of Proxy rules for users and groups. In this list, you can view the Rule Name, Source, Provider, and Action values of each Proxy rule.

You can review, edit, clone, or delete the Proxy rule from the menu on the right side of the Proxy rule. Also, you can search and filter Proxy rules. When you review the rule details from the menu, you will see the following information:

Action: Shows the condition under which the rule grants access to the user or group. Name: Displays the name of the rule. Description: Contains the description of the rule. Schedule Type: Specifies the time period during which the rule will be active. Is Active: Displays whether the rule is active or not. Auth Method: Indicates the authentication method used by the rule. Users/Groups: Displays the users/groups impacted by the rule.
To edit a Proxy rule, click the Edit option from the menu on the right side of the rule. This will redirect you to the Edit page. The Edit page has the following five main sections:
Overview: Displays detailed information about the Proxy rule, but does not allow editing in this field.

Source: You can edit the Proxy rule's Name and Description values.


Groups/Users: You can add or remove users or groups to which the rule will apply.

Schedule: You can edit the time period when the rule will be applied.

Action: You can edit the Auth Method and Action values of the rule.
On the Edit page, you can enable/disable, or delete the rule by clicking the “...” button on the top-right corner.
To create a new Proxy rule, click the Add Proxy Rule button on the top right corner. The rule creation process consists of five steps. In the first step, fill in the fields according to the following instructions:

Name: Enter a name for the rule. Description: Enter a description for the rule.

After filling in the required fields, click the Next button to proceed to the next step. In the second step, specify whether the rule will be applied to a user or a group.


After specifying, click the Next button to proceed to the next step. In the third step, select the users or groups to which the rule will apply. Transfer your selections to the Selected Users/Groups table by clicking the arrow icon next to the Available Users/Groups table.
Once the addition process is completed, click the Next button to proceed to the next step. In the fourth step, there is only one field. Complete this field according to the description below:

Schedule Type: Select the time period when the rule will run. There are three options:
All: The rule will run every day.
Recurring: The rule will run on the specified days and times.
One Time: The rule will run within the date range you specify.
After selecting, click the Next button to proceed to the final step. In the fifth step, fill in the fields according to the following instructions:

Action: Specify whether the user or group will be granted access based on the rule. Auth Method: Select the authentication method that the rule will use. OTP Timeout: It is only supported by SMS providers. It determines how many hours a code will remain valid. Note: This field only appears when SMS Provider is selected as the authentication method.
After filling in the required fields, click the Save button. Then, the Proxy rule will be successfully created.
Created Proxy rules are listed in the Configuration > Proxy Rules tab.
Priorities of the rules progress from top to bottom. To move a rule upwards, hover over it, hold it, and drag it upwards. The same process is applied to move the rule downwards.
Last updated