- Who does this policy apply to? — matched by email pattern or email domain.
- Which Sign-In modules is this guest allowed to use? — Meeting Host, Email Self-Provisioning, SAML.
- Which Self-Service actions can this guest perform? — Manage Conferences, Manage Whitelistings.
Where policies live
In the Sign-In Context admin, open the Captive Portal → Access Policies section in the left navigation. The list view shows, for each policy:- Name
- Who (Applies To) — the email patterns
- Sign In Permissions — teal pills per enabled Sign-In module
- Self-Service Permissions — green pills per enabled Self-Service action, or a red Self Service Not Enabled pill when the Self- Service Portal is off for the policy
The editor — three tabs
Each policy editor has a shared header with three cards — Policy Name, Self-Service Portal (the master-switch for this policy’s Self-Service actions), and Site Based Redirect (when on, defer this policy’s redirect to the per-Site URL in Sites Configuration). Below the header, the editor has three tabs:1. Applies To
The single set of email patterns that decide who this policy matches. One pattern per line. Leave empty on the default policy — it’s the catch-all.2. Sign-In Permissions
Three sub-tabs, one per policy-gated Sign-In module:- Meeting Host — enable the Meeting Host flow for matched guests; configure the redirect URL, the default visit duration, and the maximum number of days a host can schedule a meeting in advance.
- Email Self-Provisioning — enable self-provisioning via email; configure device quotas, redirects for new / returning / verified guests, verification-mail behaviour, device-limit policy (allow, notify, or require approval), and session length (fixed timeout or a concrete end date).
- SAML Login — enable BYOD sign-in with SAML; configure the redirect, device quota, and session length (timeout or end date).
3. Self-Service Permissions
Two sub-tabs:- Manage Conferences — allow matched Self-Service users to create and manage Conference-code sign-ins; configure the default conference URL, default and maximum conference length, and visitor limits.
- Manage Whitelistings — allow matched Self-Service users to whitelist devices by MAC address; configure the length policy (forever, a fixed number of days, or a calendar end date), maximum active entries, and calendar defaults.
Other permission pills
The policy list shows two additional Self-Service pills — Manage Guests and View My Devices — that don’t have their own toggle. They follow the master Self-Service Portal toggle: when it’s on, any guest who authenticates to the Self-Service Portal can view their own devices, and guests with the Meeting Host permission can manage invited guests.A worked example
Suppose an Organization runs two audiences on one Sign-In Context:- General guests — short visits, self-provision by email.
- Contractors — week-long engagements from a specific vendor domain, with SAML preferred.
default— no email pattern; Sign-In Permissions has Email Self-Provisioning on with a 4-hour session and a one-device quota.contractors— one email pattern matching the vendor domain; Sign-In Permissions has SAML Login on with a 5-day session and a two-device quota, plus Email Self-Provisioning as a fallback.
default.
Relationship to the rest of Sign In
- Policies are per-Context. Each Sign-In Context has its own set.
- A policy decides who can use which policy-gated module, and on what terms. Whether the module is active at all is decided at Context level on the module’s own page.
- Login events (
signin.session.*) carry the policy that was evaluated — useful for auditing which policy granted access.
Next
Sign In Modules
The authentication methods policies can enable.
Sign-In Context
How Contexts and policies fit into the Organization.

