Overview
The Policies page provides a comprehensive interface for creating, managing, and monitoring Zero Trust access policies within your organization. Policies are evaluated in real-time for every access request. Key Features:- Zero Trust policy engine
- Multiple policy types (Access, Device, Network, Authentication)
- Condition-based rules
- Active/Inactive/Draft status management
- Real-time policy enforcement
- Impact tracking (users affected)
- Policy search and filtering
Permission Required: Policy management requires
org_admin or global_admin role.Policy Types
Nexus Access Vault supports four types of policies:- Access Policies
- Device Policies
- Network Policies
- Authentication Policies
Icon: Server (Blue)Control who can access specific resources and applications.Example Conditions:
- User must be in specific group
- Resource must be accessed during business hours
- Session must be approved by manager
- Multi-factor authentication required
Type Icons and Colors
Policy Status
Status Types
Policies can be in one of three states:Active
Policy is currently enforced and affecting access decisions
Inactive
Policy exists but is not being enforced
Draft
Policy is being configured and not yet enforced
Status Badges
Policy Dashboard
The top of the page displays policy statistics: Stats Cards:Total Policies
Total number of policies in the organization
Active Policies
Policies currently being enforced
Inactive Policies
Policies that exist but aren’t enforced
Draft Policies
Policies still being configured
src/pages/Policies.tsx:203
Creating Policies
Create New Policy
Administrators can create policies using the CreatePolicyDialog:- Click Create Policy button
- Enter policy details:
- Policy Name - Descriptive name
- Policy Type - Access, Device, Network, or Authentication
- Description - Purpose and scope
- Conditions - Rules that must be met
- Initial Status - Draft, Inactive, or Active
- Submit to create the policy
CreatePolicyDialogSource:
src/pages/Policies.tsx:199
Policy Data Model
Policy Conditions
Conditions define the rules that must be met for policy enforcement:Condition Examples
User-Based Conditions
User-Based Conditions
- User must be member of “Administrators” group
- User role must be “org_admin”
- User must have completed security training
- User must have manager approval
Device-Based Conditions
Device-Based Conditions
- Device trust level >= Medium
- Device OS version >= 10.0
- Device must be corporate-managed
- Device encryption enabled
Time-Based Conditions
Time-Based Conditions
- Access only during business hours (9 AM - 5 PM)
- Access only on weekdays
- Session timeout after 8 hours
- Maximum session duration: 12 hours
Location-Based Conditions
Location-Based Conditions
- Must be in allowed countries: US, CA, UK
- Must not be in restricted countries
- Must be on corporate network
- IP must match office ranges
Condition Display
Conditions are displayed as badges on policy cards:Managing Policies
Toggle Policy Status
Quickly enable or disable policies with the status switch:Policy Impact Indicator
Each policy shows how many users or resources it affects:Editing Policies
Click the settings icon to edit a policy (admin only):Deleting Policies
To delete a policy:- Click the delete icon (trash) on policy card
- Confirm the deletion
- Policy is permanently removed
- Policy enforcement stops immediately
Search and Filter
Use the search bar to filter policies by name or description:Policy Cards
Policies are displayed as detailed cards:🖥️
High Trust Device Required
ActivoOnly devices with high trust level can access production resources
trust_level >= highresource_type == production
👥 24 afectados
src/pages/Policies.tsx:276
Policy Evaluation
When a user attempts to access a resource:Conditions Evaluated
Each policy’s conditions are checked against current context:
- User attributes (role, groups, profile)
- Device attributes (trust level, OS, location)
- Network attributes (IP, VPN status, location)
- Time attributes (current time, day of week)
Policy Decision
- If all conditions are met: Access granted
- If any condition fails: Access denied
- Multiple policies are combined with AND logic
Empty States
No Policies
If no policies exist in the organization:Best Practices
Start with Draft
Create policies in draft status first, test thoroughly, then activate
Clear Naming
Use descriptive names that explain what the policy does (e.g., “Require MFA for External Access”)
Document Conditions
Always fill in the description field to explain why the policy exists
Monitor Impact
Check the “applies to” count to understand policy scope before activating
Test Before Production
Test policies with a small user group before rolling out organization-wide
Regular Review
Audit policies quarterly to ensure they’re still relevant and effective
Common Policy Patterns
Require MFA for External Access
Require MFA for External Access
Type: Authentication
Conditions:
Conditions:
- Network location != corporate network
- User must complete MFA challenge
High Trust Devices Only for Production
High Trust Devices Only for Production
Type: Device
Conditions:
Conditions:
- Device trust level == high
- Resource environment == production
Business Hours Access Only
Business Hours Access Only
Type: Access
Conditions:
Conditions:
- Current time between 09:00 and 17:00
- Day of week: Monday-Friday
Admin Group Required
Admin Group Required
Type: Access
Conditions:
Conditions:
- User member of “Administrators” group
- Resource type == admin_tool
Related Features
- User Groups - Policies can target specific groups
- Device Management - Device trust levels feed into policy evaluation
- Application Management - Policies control application access
- Audit Logging - Policy decisions are logged for compliance