-
Admin guided workflow for easy onboarding and set up
-
Policy modeling tool
-
Terminate active user sessions and add users to the disabled user list
-
Adaptive access and security controls for Web, TCP, and SaaS applications
-
Route tables to resolve conflicts resulting from same related domains
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Policy modeling tool
Having multiple applications and several access policies can make it difficult for admins to understand the exact end-user app access result that is if the end user is allowed or denied access to an application based on all the configurations.
The policy modeling tool (Access policies > Policy modeling) solves this problem by giving the administrators full visibility into the expected app access results (allowed/allowed with restriction/denied) based on their existing configurations. Admins can check the access results for any user based on user conditions such as device type, device posture, geo-location, network location, user risk score, and workspace URL.
To analyze the access policy configuration, perform the following steps.
- In the Secure Private Access console, click Access Policies and then click the Policy modeling tab.
- Add the following details:
- Device type: Select the device type of the end user. (Desktop is selected by default.)
- Domain: Select the domain associated with the user.
- User: Select the user name for which you want to analyze the applications and associated policies.
- You can also simulate a set of conditions/constraints on the end user and their devices.
Note:
Add the exact user conditions to fetch accurate results.
- Click Simulate conditions.
- Select the condition (Device posture, Geo-location, Network location, User risk score and Workspace URL) and then select the associated value.
- Click the + sign to add more conditions.
- Click Apply.
The applications, associated policies, and rules for the selected user are displayed in a tabular format.
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.