Tenant Access Control List (ACL) is an Early Access Service and currently available only to customers on an Enterprise plan with the Attack Protection add-on.By using this feature, you agree to the applicable Free Trial Service terms described in Okta’s Master Subscription Agreement and to Okta’s Privacy Policy.To learn more about Auth0 releases, review Product Release Stages.
Tenant ACL Early Access Restrictions and LimitationsRestrictions
  • Customers on an Enterprise plan with the Attack Protection add-on can create up to 10 Tenant ACLs.
  • Each Tenant ACL can include up to 10 entries per source identifier (such as IPv4, CIDR, and more).
Limitations
  • The User Agent identifier is not supported when using self-managed custom domains.
  • The auth0-forwarded-for header is not supported.
Coming soon
  • Customers on any Enterprise plan can create up to one (1) Tenant ACL.
Tenant Access Control List (ACL) supports advanced customization through configuration of various settings. Refer to the tables below to learn more about the available options.

Signals

The following table contains all the supported signals:
SignalPropertyData typeDescription
IPv4 / CIDRipv4_cidrsarray of stringList of IPv4 addresses or CIDR ranges.
IPv6 / CIDRipv6_cidrsarray of stringList of IPv6 addresses or CIDR ranges.
Geographic country codegeo_country_codestringISO 3166-1 alpha-2 country code.
Geographic subdivision codegeo_subdivision_codestringISO 3166-2 subdivision code.
JA3/JA4 fingerprintja_fingerprintstringTSL client fingerprint.
User agentuser_agentstringClient device or browser.

Conditions

The following table contains all the supported conditions:
ConditionPropertyData typeDescription
MatchmatchobjectReturns successful if the provided signal and any of the provided values are equivalent.
Does not matchnot_matchobjectReturns successful if the provided signal and none of the provided values are equivalent.

Actions

The following table contains all the supported actions:
ActionPropertyData typeDescription
AllowallowbooleanAllows traffic to pass through unaffected.
BlockblockbooleanBlocks traffic from accessing specified scopes.
RedirectredirectbooleanRedirects traffic to a provided location.
Redirect URIredirect_uristringURI to redirect traffic to.
LoglogbooleanMonitoring mode. No action is taken, but results are included in the Tenant ACL log event.

Scopes

The following table contains all the supported scopes:
ScopeValueDescription
TenanttenantEnforces Tenant ACL for both Management API and Authentication scopes.
Management APImanagementEnforces Tenant ACL for requests sent to {yourDomain}/api/v2/* and {yourDomain}/scim/*.
AuthenticationauthenticationEnforces Tenant ACL for requests sent to anywhere not covered in Management API scope.