Set a Default Access Policy

Use Default Access Policies settings to determine how users access a resource when no conditional access policies apply to them. You can see the Default Access Policies statuses for each resource (User Portal, SSO Applications, and JumpCloud LDAP) from the Conditional Access Policies list:

Considerations

  • Conditional access policies override a Default Access Policy. 
  • For the User Portal, the Default Access Policy setting defaults to Require MFA based on user setting.
    • The Require Multi-factor Authentication on the User Portal option must be enabled individually in the User > Details tab to require MFA for the User Portal.
  • For SSO Applications, the Default Access Policy setting defaults to Allow authentication.
  • For JumpCloud LDAP, the Default Access Policy setting defaults to Allow Authentication.
  • If you want to create a Default Access Policy that denies access, we recommend that you create it after you’ve configured your conditional access policies that allow access. If you first create a Default Access Policy that denies access and there are no conditional access policies that apply to users, the Default Access Policy will apply to all of your users, and they won’t be able to access the User Portal or their SSO applications.

Configuring a Default Access Policy

To set up a Default Access Policy:

  1. Log in to the JumpCloud Admin Portal
  2. Go to SECURITY MANAGEMENT > Conditional Policies.
  3. Click the Settings (gear) icon in the top right.
  4. Expand Default Access Policy Settings.
  5. For a resource, decide what happens when users aren’t part of a conditional access policy:
    • If you don’t want to require Multi-factor Authentication (MFA), select Allow authentication.
    • If you want to require MFA, select Allow authentication & require MFA
    • If you want to deny access, select Deny access
    • For the User Portal only, if you want the Require MFA setting in the User > Details tab to determine how a user accesses a resource, select Require MFA based on user setting. To find and configure this setting, see Requiring MFA Factor Types from User Details.
      • When Require Multi-factor Authentication on the User Portal is selected on the User > Details tab, users are required to authenticate with MFA when no conditional access policies apply to them. 
      • When Require Multi-factor Authentication on the User Portal isn’t selected on the User > Details tab, users aren’t required to authenticate with MFA when no conditional access policies apply to them. 
  6. Click save.

Requiring MFA Factor Types from User Details

For a Default Access Policy, you have the option to select Require MFA based on user setting. This lets the Require Multi-factor Authentication on the User Portal setting on the User > Details tab take effect when no conditional access policies apply to a user. 

To configure the Require MFA setting from a User > Details tab

  1. Log in to the JumpCloud Admin Portal
  2. Edit a user or create a new user in the Admin Portal. See Get Started: Users.
  3. In the User Security Settings and Permissions section, select Require Multi-factor Authentication on the User Portal if you want users to authenticate with MFA when no policies apply to them.
  4. If you’re using TOTP MFA, you can enter in a number for the enrollment period, but enrollment periods will only apply if no other policy applies and if the Default Access Policy is set to Require MFA based on user setting. Without the enrollment period, users who don’t have MFA set up are required to enroll in MFA the next time they log in to the User Portal. 
  5. Click save user.
Back to Top

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case