An Identity-Aware Proxy (IAP) enforces that wall. It sits in front of your internal apps and forces every request through identity checks before letting a packet slip through. With Okta Group Rules, you can decide exactly who gets through, when, and under what conditions—without touching code in your app.
Identity-Aware Proxy Okta Group Rules are the key to combining context-aware access with role-based authorization. By mapping users to Okta groups dynamically, you can make the proxy enforce your access models in real time. That means no stale LDAP lookups, no static ACL files, no manual role reviews.
Here is the flow.
- A request hits the IAP endpoint.
- The proxy redirects the user to Okta for authentication.
- Okta evaluates Group Rules you’ve set: membership based on attributes like email domain, department, device trust, or any custom SAML/OIDC claim.
- If the user matches a rule, they’re added to the relevant group instantly.
- The IAP reads the group claim from the token and grants or denies access.
This design is powerful because Group Rules let you adapt access without redeploying infrastructure. Need to onboard a new team to a staging environment? Adjust the rule in Okta’s admin console. The next login honors it, enforced at the proxy layer.