Step 3 - Create Cloud Authentication Policies with Extended Authentication as Secondary Action
For instructions on creating a cloud authentication policy, see Creating Cloud authentication policies.
When a user tries to access a network covered by the policy, the user will be redirected to a new screen and prompted to log in. After entering the correct login credentials and successful authentication, the user can proceed with the activity. If the policy requires re authentication at the end of a session, the user must log in again when the session ends.