App Policy Decision node
RAPID only
The App Policy Decision node is a specialized version of the Policy Decision node designed to simplify the evaluation of application access policies within a journey.
For example, use the node to restrict access based on user attributes, such as ensuring only end users in a specific finance group can access a finance portal.
You don’t need to configure the node because it automatically identifies the policy set and resource from the journey context. However, the node assumes the following prerequisites:
-
The node is used within an OAuth 2.0/OIDC or SAML application journey.
-
The application ID (OAuth 2.0 client ID or SP entity ID) is specified as the resource when the journey is invoked.
-
An access policy with that resource is defined within the application.
The outcome of the policy evaluation, to accept or reject access, map to the node’s outcomes. It doesn’t handle advices or environment conditions.
Example
This example uses an App Policy Decision node to manage access to a finance portal application based on usernames.
Prerequisites
The following setup is assumed:
-
A test end user, added to the
Financegroup in IDM. -
An OIDC application, with the following settings:
- Client ID
-
finance-app - Access Policy
-
AnyCondition:
User Group Membershipequals
Value:
Finance
Example policy
- Use a journey to authenticate users to this application
-
example journey
Example journey
-
The authorization journey is invoked specifying the OAuth 2.0 client ID as the resource, for example:
https://tenant-env-fqdn/am/oauth2/alpha/authorize?client_id=finance-app&redirectUri=http://www.example.com/signin&scope=openid&response_type=code
-
The Page node containing the Platform Username node and Platform Password node prompts for credentials.
-
The Data Store Decision node validates the username-password credentials.
-
A successful authentication routes the journey to the App Policy Decision node.
The node has no configuration, but relies on the journey context and prerequisite configuration to identify the OAuth 2.0 client ID resource (
finance-app). It can then locate the access policy to evaluate whether the end user is a member of theFinancegroup. -
The outcome of the policy evaluation determines the path of the journey:
- Accept
-
The policy grants access. The Message node informs the end user they’re authorized and the journey is successful.
- Reject
-
The policy rejects access. The Message node informs the end user they’re not authorized.
- Error
-
An error in policy evaluation leads to the failure outcome.
- Unknown Resource
-
The node failed to identify the resource and the journey continues to the Set Error Details node.
Inputs
If policy evaluation requires a subject, make sure the username is collected earlier in the journey.
Dependencies
This node requires the following configuration:
-
An application (OAuth 2.0 client or SAML SP entity) that uses a journey with an App Policy Decision node
-
An access policy defined within the application