Skip to content
  • There are no suggestions because the search field is empty.

How do I view, search, and filter cipherscale access policies?

  1. Sign in to your cipherscale space administration portal.

  2. To view access policies that govern access to private resources, navigate to Private Access.

  3. To view access policies that govern access to SaaS applications, navigate to SaaS Access.

  4. Select the Access Policies tab.

    1. The Access Policies tab lists the existing access policies as rows in a table with their priority number (#), Name, Source, Action, Destination, and Admission Rule.

    2. Each row also has a more options menu with these options: Edit, Create new above, Create new below, Delete, and Duplicate.

  5. Click the Filter button to filter the list of policies.

    1. You can add various conditions to the filter and use multiple conditions together. The conditions filter on:

      1. Whether a User, Group, or device is or isn’t present in the policy’s Source.

      2. Whether a specific resource is or isn’t present in the policy’s Destination.

      3. Whether a specific admission rule is or isn’t in use with a policy.

    2. Click Apply

    3. The table will show only the Access Policies that match the filter criteria.

    4. Click Clear filters to reset the filter.

  6. To search, enter the keyword in the Search field.

    1. The list of Access Policies narrows as you type

    2. Click the x in the Search field to reset.

  7. To view access policies that govern access to the Internet, navigate to Internet Access and select the Access Policies tab.

    1. The Access Policies tab lists the existing access policies as rows in a table with their priority number (#), Name, Source, Internet Mode, and Admission Rule.

    2. Each row also has a more options menu with these options: Edit, Create new above, Create new below, Delete, and Duplicate.

    3. A  Default Internet Access Policy is always present and cannot be deleted. New policies are created above this policy.

  8. To filter and search internet access policies, see the steps 5 & 6 above.