Difference between revisions of "Access Profiles"
From AgileApps Support Wiki
imported>Aeric |
imported>Aeric |
||
Line 3: | Line 3: | ||
:{{Permissions|Access Control/User Management|modify Administration controls {{TBD|Change to what?}}}} | :{{Permissions|Access Control/User Management|modify Administration controls {{TBD|Change to what?}}}} | ||
===IP | ===Login IP Address Restrictions=== | ||
{{:IP | {{:Login IP Address Restrictions}} | ||
<noinclude> | <noinclude> | ||
[[Category:Administration| 23]] | [[Category:Administration| 23]] | ||
</noinclude> | </noinclude> |
Revision as of 01:03, 7 June 2012
placeholder
Users that have the Access Control/User Management permission can modify Administration controls __TBD: Change to what?__
Login IP Address Restrictions
For extra security, enter ranges of IP addresses from which users are allowed to access the platform. If a user attempts to login from a computer on a network outside of the specified range, access to the platform is denied.
Users that have the Access Control permission can specify the range of IP addresses from which user logins are allowed.
- To configure an IP address range
- Click > Administration > Access Management > Access Profiles
- Select the Access Profile of interest, or create a new one
- Enter an IP address range in the text area, following these guidelines:
- A maximum of 25 IP address ranges can be specified
- Enter one range per row in the text area
- Add, Modify and Delete the entries, as needed
- Accepted format is xxx.xxx.xxx.xxx - yyy.yyy.yyy.yyy, where:
- xxx and yyy are numbers in the range 0-255
- xxx.xxx.xxx.xxx is less than or equal to yyy.yyy.yyy.yyy
- To specify a single IP address, use the same IP address for the start and endpoint of the range: 192.168.1.10 - 192.168.1.10
- How it works
-
- When a user attempts to log in, the IP address of the system the request originated from is checked against the configured settings. If the address is in the allowed range, the user can continue the login process. Otherwise, login is denied.
- Access violations are recorded in the audit log, identifying both the user and the IP address from which the login attempt originated
- Login restrictions apply to all user logins - using a web browser, Email Edition, mobile access, or REST APIs.
- The restrictions do not apply to Customer Support logins.