Supported editions for this feature: Frontline Standard and Frontline Plus; Enterprise Standard and Enterprise Plus; Education Standard and Education Plus; Enterprise Essentials Plus; Cloud Identity Premium. Compare your edition
As an administrator, you can assign Context-Aware Access levels to all internal and third-party OAuth apps that use “Sign in with Google.” You can control access by user identity, device security status, IP address, and geographical location.
Note: Context-Aware Access rules are applied only when a user signs in through Google. After a user is successfully signed in, the third-party app controls the session. Therefore, if the user's access conditions change later, Context-Aware Access won't block the active session. The user would only be checked against the Context-Aware Access policy again during their next sign-in attempt.
When you assign access levels…
Users are granted access to the app when they meet the conditions specified in one of the access levels you select (it’s a logical OR of the access levels in the list). If you want users to meet the conditions in more than one access level (a logical AND of access levels), create an access level that contains multiple access levels. If you want to assign more than 10 access levels for an app, you can use nested access levels.
Assign Context-Aware Access levels to third-party apps
Before you begin: If needed, learn how to apply the setting to a department or group.
- 
    Sign in with an administrator account to the Google Admin console.If you aren’t using an administrator account, you can’t access the Admin console. 
- Click General Settings.
- 
    (Optional) To apply the setting only to some users, at the side, select an organizational unit (often used for departments) or configuration group (advanced). Show me howGroup settings override organizational units. Learn more 
- In the Access levels for OAuth apps section, click Edit . 
- Choose the access levels you want to apply to internal and third-party OAuth apps using Google sign-in:
    - Active mode: Blocks access to apps that don't meet the access levels
- Monitor mode: Logs access attempts that don't meet any of the selected access levels, but doesn't block access
 
- 
    Click Save. Or, you might click Override for an organizational unit.To later restore the inherited value, click Inherit (or Unset for a group). 
You’re returned to the Access levels for OAuth apps section that shows the access levels applied to all internal and third-party OAuth apps in both monitor and active mode.