More
    OneIdPA step-by-step guide to enforcing Extended Access Policies (XAP) using OneIdP

    A step-by-step guide to enforcing Extended Access Policies (XAP) using OneIdP

    How do you stop risky sessions without tanking productivity?
    That’s the challenge most IT and security teams face as work moves outside controlled office networks. Devices, users, and connections constantly change, making traditional access controls too rigid or too lenient.

    Configure Extended Access Policies

    This is where Extended Access Policies (XAP) come in. They add an adaptive layer of security that checks user, device, and environment context before granting or maintaining access. By continuously verifying posture and risk, XAP keeps sessions safe, not just at login but throughout their lifecycle.

    This guide walks you through what XAP is, why it’s essential for a Zero Trust setup, and how you can easily configure it using Scalefusion OneIdP. It’s built for identity engineers, security architects, and IT admins who want to move beyond static rules toward smarter, context-driven access.

    What are Extended Access Policies (XAP)?

    Extended Access Policies are intelligent, context-aware access controls that go beyond basic authentication. Instead of granting access purely based on credentials, XAP evaluates a mix of factors such as:

    • User identity and role
    • Device posture (security tools installed, OS version, encryption status)
    • Network and location context
    • Behavioral signals (unusual access times, impossible travel, or new device)

    Unlike one-time verification methods, XAP applies continuous checks during sessions. This aligns perfectly with Zero Trust principlesnever trust, always verify. It ensures access remains valid only as long as risk signals stay within acceptable limits.

    Why Extended Access Policies matter?

    Static access policies were designed for a world where users worked inside corporate offices on managed devices. That world no longer exists. Today, users sign in from airports, home networks, co-working spaces, and public cafés — all with different risk profiles.

    Extended Access Policies help organizations adapt to this dynamic environment by adding intelligence to authentication decisions. For instance, imagine a remote employee connecting from a café’s public Wi-Fi. Everything seems fine until the system detects the device is missing endpoint protection or behaving abnormally. Instead of allowing full access, XAP can trigger additional verification or limit the session scope automatically.

    A real scenario might look like this:

    • Remote worker connecting from public Wi-Fi
    • Device missing security tools
    • Behavioral anomaly detected
    • Step-up MFA triggered automatically

    XAP doesn’t rely on fixed assumptions about networks or locations. It constantly evaluates posture and context, helping organizations maintain both productivity and strong security.

    How Extended Access Policies (XAP) work?

    Here’s an overall view of how the process works:

    Policy Definition
    An administrator defines access conditions within the Scalefusion portal using the XAP configuration wizard. These conditions may include compliance status, OS updates and patches, IP address, device location, installed applications, and other contextual signals.

    Real-Time Evaluation
    Scalefusion evaluates these conditions in real time using its built-in Rules Engine, continuously monitoring device posture and user context against the defined policies.

    Signal Transmission to OneIdP
    Based on the evaluation, Scalefusion passes a compliance signal to OneIdP, indicating whether the device and user meet the defined access criteria.

    Access Enforcement by OneIdP
    OneIdP uses this compliance signal to:

    • Allow or block access to SSO-integrated services
    • Automatically log out users from devices that no longer meet compliance requirements
    • Store logs and audit data for future analysis and compliance reporting

    This continuous loop between Scalefusion and OneIdP ensures every access request is validated through real-time context, helping organizations maintain Zero Trust enforcement without manual intervention.

    How to set up XAP in OneIdP?

    You can enforce Extended Access Policies directly within Scalefusion OneIdP using its integrated Zero Trust and posture-based access engine.

    Follow these steps:

    Pre-Requisites

    Before you start, make sure these are configured on the Scalefusion Dashboard:

    • User Groups are created.
    • SSO is configured for the required applications.
    • Veltar > Compliance is set up.
    • OS Updates & Patch Management is configured.

    Step 1: Create Configuration

    To create or edit an Extended Access Policy (XAP) configuration,

    1. On Scalefusion Dashboard, navigate to OneIdP > Extended Access Policies > Access Policies
    2. Click on Create Configuration to open the XAP Wizard.
    access policies

    3. Enter a name for your configuration.

    4. Configure the following tabs:

    • Compliance & Security – Set access based on Veltar compliance, risk level, or pending OS updates and patches.
    • Location – Restrict or allow access using geofence-based rules for managed and unmanaged devices.
    • IP Address – Allow logins only from specific IP ranges (public or private).
    • Application Status – Require specific apps (and versions) to be installed for access.
    • General – Block rooted/jailbroken devices, enforce domain join checks, and define how non-compliant devices are handled.

    5. Click Save Configuration when done.

    configuration

    1. Compliance & Security Settings

    1. Go to the Compliance & Security tab in the XAP Wizard.
    2. Configure access based on Veltar Compliance and OS update status.
    3. Choose how access should be controlled:
      • Based on Risk Status – Allow devices with selected risk levels (Low, Medium).
      • Based on Compliance Percentage – Set the minimum compliance percentage (50–100%) required for access.
      • Only if Marked Compliant – Grant access only to devices marked as compliant.
      • When Compliance Is Not Reported – Optionally allow access for devices that haven’t yet reported compliance (e.g., during first setup or offline).
    4. Click Save after selecting the desired compliance rules.

    2. OS Updates & Patches Access Control

    PlatformConditions
    Android
    No pending OS updates older than [15-30] daysCheck OS Update based on:Update Release DateReported On
    Linux
    No pending critical or security updates;No OS updates older than [15-30] daysCheck OS Update based on:Update Release DateReported On
    macOS
    No pending OS updates older than [15-30] days
    Windows
    No pending critical or security updates;No OS updates older than [15-30] daysCheck OS Update based on:Update Release DateReported On
    os update & patches

    3. Location Settings

    1. Go to the Location tab to set up location-based access rules using geofences.
    2. Make sure the geofence is published on managed devices before applying the XAP policy.
    3. Choose how location control should work:
      • Based on Geofence Events (Managed Devices) – Allow or restrict access when a managed device moves in or out of a geofence. You can apply this for Android, iOS/iPadOS, macOS, and Windows.
      • Based on Geofence (Unmanaged Devices) – Control browser logins on unmanaged devices using selected geofences from the dashboard.
    4. Click Save once you’ve set the desired rules.
    location based access

    4. IP Address Settings

    1. Go to the IP Address tab to set up access controls based on IP ranges.
    2. Choose how you want to apply IP-based restrictions:
      • For Managed Devices – Allow access only from specified public or private IP ranges for Scalefusion-managed devices.
      • For Unmanaged Devices – Restrict browser logins to selected public IP ranges only.
    3. Use the IP Address table to add and define allowed IP ranges.
    FieldDescription
    Address TypeSelect Public or Private IP addresses
    IP TypeChoose IPv4 or IPv6
    IP AddressEnter valid IP addresses or ranges in CIDR format (e.g., 192.168.1.0/24)
    ActionsAdd Range: Adds a new row for IP input
    Delete: Removes a row

    By clicking on Add Range, you can add multiple IP ranges as needed to cover different network segments.

    IP based access

    5. Application Status Settings

    1. Go to the Application Status tab to set rules based on installed apps and their versions.
    2. Enable Allow access based on application install status and version.
    3. Define which apps must be installed on a device to allow access, and optionally set a minimum version for each app.
    4. Use the Application table to add and manage these rules for different operating systems.
    FieldDescription
    OSSelect the platform:Android,iOS/iPadOS,macOS,Windows
    ApplicationSearch for the application (searches apps from your account based on the selected OS). Lists all applications installed on the device including Enterprise Apps and Scalefusion Managed Apps.
    Install StatusInstalled
    Version CheckChoose if and how to validate the app version:Not Required (default)Version Name (e.g., v1.2.3): Exact matchVersion Code (e.g., 10203): Exact matchVersion Name Equal or aboveVersion Code Equal or above
    Version InfoEnter the version value (enabled only if Version Check is set to Name or Code)
    ActionsDelete: Removes a row from the table

    Likewise, click on Add App on the top right to add multiple apps for different OS.

    Application status

    6. General Settings

    1. Go to the General tab in the Extended Access Policy wizard to configure additional access rules and fallback options.
    2. Block Access if Device is Jailbroken, Rooted, or Fails Attestation
      • Prevents access from devices that are jailbroken (iOS), rooted (Android), or fail attestation checks.
      • Applies to: Android, iOS, macOS
    3. Allow Access Only if Devices are Domain Joined
      • Grants access only to devices that are domain joined.
      • Applies to: Windows
    4. Choose Non-Compliant Handling for Scalefusion Managed Devices
      • Decide how to handle access for devices marked as non-compliant:
        • Allow users to remediate for self-remediable compliance issues – Users will be prompted to fix the issues themselves.
    access blocked
    • View Details: Displays all failed rule summaries.
    • Scan Now: Immediately triggers a compliance scan on desktop devices.
    • Update: Starts installing pending OS updates.
    • If pending OS updates or patches are detected, a separate message appears.
    access blocked
    • Show the Access Denied message configured in SSO – Blocks access and shows the message defined in your SSO configuration.
    general settings

    Step 2: Publish Configuration

    1. After creating the configuration, it will appear under the Access Policies tab.
    2. Click the Publish icon next to the configuration.
    3. In the pop-up window, select the user group(s) where you want to apply the configuration.
    4. Click Publish to complete the process.
    user groups

    Additional Actions

    You can manage your existing configurations with the following options:

    • Unpublish – Remove the Extended Access Policy from the user groups where it’s applied.
    • Edit – Modify the configuration settings as needed.
    • Delete – Permanently remove the configuration and clear related compliance records from all associated devices.
    configuration

    End User Experience

    When users sign in on a device with an Extended Access Policy (XAP) applied, they’ll see a compliance check screen during login.

    access blocked

    This screen appears when policies such as Veltar Compliance, IP restrictions, or application requirements are active.

    Adopt context-aware authentication with Scalefusion OneIdP’s XAP capabilities

    Strong, context-aware access security is essential in today’s distributed work environment. Traditional access controls based on network or location can’t keep up with hybrid and remote work patterns. What organizations need is visibility into who is accessing resources, from where, and under what conditions.

    That’s exactly what Scalefusion OneIdP’s Extended Access Policies (XAP) deliver.
    By combining device posture signals from Scalefusion with identity context in OneIdP, organizations gain a unified access control layer that:

    • Reduces exposure from risky sessions
    • Ensures only compliant, secure devices can connect
    • Detects and responds to anomalies instantly
    • Strengthens the foundation of a Zero Trust framework

    With OneIdP, access decisions become smarter, faster, and more reliable — giving IT teams the confidence to enforce security without slowing business down.

    <!– Include in your –>

    See how OneIdP can help you enforce smarter access policies.

    Schedule a demo now.

    Get a Free Trial

    Anurag Khadkikar
    Anurag Khadkikar
    Anurag is a tech writer with 5+ years of experience in SaaS, cybersecurity, MDM, UEM, IAM, and endpoint security. He creates engaging, easy-to-understand content that helps businesses and IT professionals navigate security challenges. With expertise across Android, Windows, iOS, macOS, ChromeOS, and Linux, Anurag breaks down complex topics into actionable insights.

    More from the blog

    CIAM vs IAM: Key Differences Explained

    Businesses handle thousands of users, applications, and devices every single day. Employees need access to internal tools, contractors require...

    How to configure single sign-on for Salesforce?

    When you think of enterprise tools that hold your company’s most critical data from sales pipelines to customer records,...

    How to set up Single Sign-On for Okta?

    If your team relies on Okta to connect with business apps every day, you already understand how important a...