Review or Search for Access Restrictions


Two-factor authentication is the preferred alternative to restricting access by IP address. For more information, see Two-Factor Authentication (2FA).

Review IP Address Restrictions

To see a list of all users and review a list of the IP addresses they are restricted to using for each assigned role, go to Setup > Users/Roles > View Login Restrictions.

Search for User Login Restrictions

Users with the proper privileges can search for User Login Restrictions by user, role, and IP address.

To search for user login restrictions:

  1. Go to Setup > Users/Roles > View Login Restrictions.

  2. Click Search in the upper right corner of the page.

  3. On the search page, enter your required search parameters in the available User, Role, and IP Addresses Allowed to Login fields.

  4. Click Submit.

Related Topics

Enabling and Creating IP Address Rules
Enable the IP Address Rules Feature
Create Company IP Address Rules
Create Individual IP Address Rules
Create Roles without IP Address Restrictions

General Notices