IP Restriction

Here, you can take control of your platform's security by defining which IP addresses are allowed to connect. This feature empowers you to safeguard your resources and data by specifying trusted IPs, whether it's a single address or a range. In this guide, you'll learn how to configure these settings to enhance your platform's security.

  • Navigate to Settings > Identify & Access Management | IP Restriction
  • Here, you'll find a list of existing IP definitions. To create a new configuration, click on the Add button.


Editing or Removing IP Configurations

If you need to make changes or remove an IP configuration, it's straightforward. Just click on the name of the configuration you want to modify. To delete it, click on the Trash Bin icon. Make any necessary alterations and hit Save to update the configuration.

  • Next, you'll encounter the IP List Configuration modal. Fill in the fields as described below.
  1. IP Type (IP or Range): This field determines whether you're configuring a single IP address or a range of IP addresses. Select IP if you want to specify a single, exact IP address. Choose Range if you want to define a broader set of IP addresses within a particular range.


    Some examples for defining ranges

    • -
  2. IP Name (Configuration Name): This is where you provide a name for your IP configuration. It's for your reference and should be something easily recognizable, helping you identify the purpose of this restriction.
  3. IP Address (IP Address or Range): In this field, enter the specific IP address (for single IP configurations) or a range of IP addresses (for IP range configurations) that you want to allow or restrict from connecting to your platform. This is where you define the actual IP information for your restriction.


You are all set

After clicking Save, the IP restrictions will be ready to take effect.