A financial services firm is deploying Zscaler Private Access (ZPA) and must ensure that developers connecting from unmanaged personal devices (BYOD) can only access a specific set of non-sensitive development tools. Access from corporate-managed devices should be unrestricted. The firm uses Okta for identity management. Which ZPA feature is the most precise and secure mechanism to enforce this policy?