How Location-Based Access Works
Location-based access combines the registered IP addresses of the computers and public roles to control access to the application.
Scenarios
To understand how location-based access works, consider the following scenarios and their effect on user access.
To avoid any access-related issue, carefully examine the given scenarios and plan well before you enable location-based access.
| 
                         Scenario  | 
                     
                         Impact on User Access  | 
                  
|---|---|
| 
                         You disable location-based access.  | 
                     
                         All users signing into the application from their respective computers continue to have the same level of access as they had earlier.  | 
                  
| 
                         You enable location-based access and register few IP addresses, but don't grant public access to any role.  | 
                     
                        
  | 
                  
| 
                         You enable location-based access, register a few IP addresses, and grant public access to certain roles.  | 
                     
                        
  | 
                  
| 
                         You enable location-based access, but don't register any valid IP address, and don't grant public access to any role.  | 
                     
                         Users can sign in with valid credentials but can access only the generic tasks that aren't assigned to a specific role. Caution: 
                            
                     Try and avoid this scenario. Register at least one valid IP address and grant public access (access from all IP addresses) to IT Security Manager role when you enable location-based access.  |