Skip to main content
Skip table of contents

Managing dynamic app policies

App security policies are business logic rules that you use to secure iOS and Android apps via the Blue Cedar integration platform. Use the integration platform to inject these policies into apps to secure them post development, before the secured apps are deployed to end users. This process is described in the integration platform documentation.

Static app policies are embedded in the Blue Cedar injectable. If you add or change a static policy, you must re-secure the app with the integration platform and re-deploy the app. See the integration platform documentation for details about these Blue Cedar-defined policies.

Dynamic app policies are managed on the gateway. These rules apply without having to re-secure the app, in response to events on the mobile device or to connections to the gateway. You define dynamic policies on the gateway as configuration profiles or as post-authentication policy rules.

The following tables compare the dynamic app policy options and describe some use cases. For more details and examples, see the related links.

Client rulesGateway rules
set aaa config-profile
set aaa post-auth-policy-match-rule

Defined on the gateway

Defined on the gateway

Evaluated and executed on the client

Evaluated and executed on the gateway

Messages displayed on the deviceMessages displayed on the device

Client must be running 3.20.0+

Client must be running 3.14.0+
Dynamically modify/override static policy options for Browser Configuration, Diagnostics, or Secure Web Stack policies (as applied via the integration platform)Can allow/deny gateway connections
If you want toUse this kind of ruleWhat happens
Block launching a secured app on specific mobile devices or OS versions.

Client must be running 3.20.0+

Define a client rule in a configuration profile on the gateway to:

  • Trigger when the app starts
  • Check the device or OS
  • Display a terminal message
When the app starts, the rule evaluates the device type and OS. If those conditions are met, the message displays and the app exits.

Display a reminder (non-blocking) to upgrade the app with a link to do so.

Client must be running 3.20.0+

Define a client rule in a configuration profile on the gateway to:

  • Trigger when the app starts
  • Check the app version
  • Display a reminder message
  • Provide a link to install the latest version
When the app starts, the rule evaluates the app version. If the app is old, the message displays with a link to install the latest version.


Block launching a secured app


Define a gateway rule in a configuration profile on the gateway to:

  • Check the device or OS
  • Display a terminal message (for the deny case. not available for allow)


After the connecting client has completed authentication, the gateway rule evaluates the <match> and either allows the connection or denies-with-message. (Note there is no allow-with-message.)

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.