The first login attempt failed, and the dashboard locked. The reason was simple: the NDA Okta Group Rules were wrong.
Okta Group Rules control access by assigning users to groups based on conditions you define. When dealing with NDA-bound projects, these rules decide what code, data, or tools a user can touch. The configuration lives inside the Okta Admin Console, under Directory → Groups → Rules. For NDA Okta Group Rules, precision is critical—misconfigurations can allow the wrong user into a restricted environment, or block someone who needs access to ship code.
An NDA Okta Group Rule starts with a trigger condition. This can include profile attributes like department, job title, or a custom NDA flag. Okta evaluates each incoming login against these conditions. If the rule matches, the user is auto-assigned to the correct NDA group. That group maps to specific application permissions, repositories, or API scopes.
Best practice is to keep each NDA Okta Group Rule narrow and explicit. Avoid overlapping rules that produce conflicts, and make sure they’re processed in the correct order since Okta applies them from top to bottom. For example, a general engineering access rule should never sit above a stricter NDA rule for the same attributes. The stricter rule must come first.