Perform Access Policy Group Operation Test (Modern View)


This article is intended for administrators who perform initial setup and operational management of HENNGE Access Control.


We will verify whether the access control policies configured in HENNGE Access Control are functioning correctly.


1. The content of this article is based on product specifications as of September 2023 and may change without notice in the future.

2. HENNGE Access Control administrator privileges are required for actual screen verification and configuration changes.

3. Refer to the following article for how to access the admin console:
 Accessing HENNGE Access Control admin console

4. Please prepare a test user who is not an administrator user in HENNGE Access Control in advance.

5. Please prepare a test access device (PC or mobile) in advance.

Detailed Explanation / Procedure 

1. Access [Access Policy Groups] in the left menu of the HENNGE Access Control management screen.


2. Check the number of created access policy groups.

※ In the example image, there are 5 access policy groups.


3. Access [User List] in the left menu of the HENNGE Access Control management screen.


4. Click on the row of the test user.


5. Set the configuration in the [Access Policy Groups] column to one of the created access policy groups and click [Change].


6. Verify the login from HENNGE Access Control using the test user from the test access device.

Access will be performed with both allowed and disallowed access methods based on the selected access policy group.
Verify access from the browser, using the HENNGE Access Control user portal screen as the access destination, instead of groupware (Microsoft 365 or Google Workspace).
The URL for the HENNGE Access Control user portal screen may vary by customer tenant.

Access URL Example:[Main Domain]/

However, if you want to verify access from sources other than browsers (Outlook, Gmail, etc.), connect HENNGE Access Control and groupware in advance, and access to the email system (Exchange Online, Gmail, etc.) is required.

7. Perform steps 3 to 6 for all access policy groups in your environment.


Was this article helpful?