How Location-Based Access Works
Location-based access combines the registered IP addresses of the computers and public roles to control access to the application.
Scenarios
To understand how location-based access works, consider the following scenarios and their effect on user access.
To avoid any access-related issue, carefully examine the given scenarios and plan well before you enable location-based access.
Scenario |
Impact on User Access |
---|---|
You disable location-based access. |
All users signing into the application from their respective computers continue to have the same level of access as they had earlier. |
You enable location-based access and register few IP addresses, but don't grant public access to any role. |
|
You enable location-based access, register a few IP addresses, and grant public access to certain roles. |
|
You enable location-based access, but don't register any valid IP address, and don't grant public access to any role. |
Users can sign in with valid credentials but can access only the generic tasks that aren't assigned to a specific role. Caution:
Try and avoid this scenario. Register at least one valid IP address and grant public access (access from all IP addresses) to IT Security Manager role when you enable location-based access. |