Review or Search for Access Restrictions

Note:

Two-factor authentication is the preferred alternative to restricting access by IP address. For more information, see Two-Factor Authentication (2FA).

Review IP Address Restrictions

To see a list of all users and review a list of the IP addresses they are restricted to using for each assigned role, go to Setup > Users/Roles > View Login Restrictions.

Search for User Login Restrictions

Users with the proper privileges can search for User Login Restrictions by user, role, and IP address.

To search for user login restrictions:

  1. Go to Setup > Users/Roles > View Login Restrictions.

  2. Click Search in the upper right corner of the page.

  3. On the search page, enter your required search parameters in the available User, Role, and IP Addresses Allowed to Login fields.

  4. Click Submit.

Related Topics

General Notices