Skip to main content

Policy configuration overview

You can use authentication rules set up in a default policy or create a custom policy. When you first create a custom policy, it contains the same rules as the default policy. Then, you can customize the new policy to meet the security needs of your organization.

Each policy must have at least two authentication rules at any given time. Before you can delete a custom policy, you must reassign any attached resources to another policy.


Next steps

Configure your policy rules like adaptive authentication, login workflows, use of MFA methods, and attach resources.