Software Secure Access
Activity Manage

Composite Sources for Private Access Rules

You can define a source using multiple network address components. A composite source accepts IP addresses, CIDR blocks, and wildcard masks directly in a private access rule.


 
If you will allow access from a branch network, and you specify users or user groups, you must also configure SAML authentication for those users.