Review or Search for Access Restrictions
Two-factor authentication is the preferred alternative to restricting access by IP address. For more information, see Two-Factor Authentication (2FA).
Review IP Address Restrictions
To see a list of all users and review a list of the IP addresses they are restricted to using for each assigned role, go to Setup > Users/Roles > View Login Restrictions.
Search for User Login Restrictions
Users with the proper privileges can search for User Login Restrictions by user, role, and IP address.
To search for user login restrictions:
-
Go to Setup > Users/Roles > View Login Restrictions.
-
Click Search in the upper right corner of the page.
-
On the search page, enter your required search parameters in the available User, Role, and IP Addresses Allowed to Login fields.
-
For more information about entering search parameters, see Defining a Simple Search.
-
If you need help in defining filters for a simple search, see Tips for Defining Simple Search Filters.
-
If you need more search criteria, check the Use Advanced Search box.
If you need help, see Defining an Advanced Search.
-
-
Click Submit.