You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/deployment/mendix-cloud-deploy/access-restrictions.md
+32-33Lines changed: 32 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,25 +98,49 @@ For each profile, specify the following details:
98
98
99
99
Requests originating from an IP address within these allowed profiles will be granted access to your application.
100
100
101
+
### Applying Access Restriction to an Application Environment
102
+
103
+
To apply access restrictions to a specific application environment, follow these steps:
104
+
105
+
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
106
+
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
107
+
3. Go to the **Network** tab.
108
+
4. Navigate to the [Path Based Access Restrictions](/developerportal/deploy/environments-details/#path-based-restrictions) section to apply access restrictions to a single environment.
109
+
110
+
{{% alert color="info" %}}
111
+
112
+
* The top-level path (`/`) restricts access to the entire application
113
+
* The settings for specific paths override the implicitly inherited profile for the top level
114
+
* Besides being able to apply a customized access restriction profile, there are also presets available for simply allowing or denying all access
115
+
116
+
{{% /alert %}}
117
+
118
+
#### Default Settings
119
+
120
+
These are the default settings:
121
+
122
+
* When deploying a deployment package to an environment using the **Deploy** or **Transport** functionality, paths representing known functionality in the Mendix version that is used are automatically added to the list of paths
123
+
* All paths ending in `-doc` have a preset **Deny all access** profile set by default
124
+
* All the remaining paths have no restriction applied by default
125
+
101
126
## IP Restriction Profiles {#ip-restriction-profiles}
102
127
103
-
Ip Restriction profiles allows you to deny access to specific ip or ip ranges to your application.
104
-
You can specify multiple ip restriction profiles for your application, each with a descriptive name that reflects its purpose.
128
+
IP restriction profiles allow you to deny access to your application from specific IP addresses or IP ranges. You can configure multiple profiles, each with a descriptive name that clearly reflects its purpose.
105
129
106
-
To view or manage ip restriction profiles, follow these steps:
130
+
To view or manage IP restriction profiles, follow these steps:
107
131
108
132
1. From [Apps](https://sprintr.home.mendix.com), go to your app's **Environments** page.
109
133
2. Click **Cloud Settings** ({{< icon name="settings-slider-1" >}}) from any of the [available tabs](/developerportal/deploy/environments/#available-tabs) to open the **Manage Cloud Settings** page.
110
134
3. Switch to the **IP Restriction Profiles** tab.
111
135
112
-
When configuring an ip restriction profile, keep the following considerations in mind:
136
+
When configuring an IP restriction profile, keep the following considerations in mind:
113
137
114
138
* IP restriction profiles are configured at the application level. They can be reused in all the environments (for example test, acceptance, production) of an app.
115
139
* IP restriction profiles can contain any number of IPv4 or IPv6 address ranges
116
140
117
141
### Configuring IP Restriction Profiles {#access-restriction}
118
142
119
-
To configure ip restriction profiles, from the **IP Restriction Profiles** page, you can either:
143
+
To configure IP restriction profiles, from the **IP Restriction Profiles** page, you can either:
120
144
121
145
* Create a new profile by clicking **New Profile**
122
146
* Modify an existing profile by selecting the profile:
@@ -144,45 +168,20 @@ For each profile, specify the following details:
144
168
145
169
Requests originating from an IP address within these denied profiles will be blocked from accessing your application.
146
170
147
-
## Applying Access Restriction to an Application Environment
148
-
149
-
To apply access restrictions to a specific application environment, follow these steps:
150
-
151
-
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
152
-
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
153
-
3. Go to the **Network** tab.
154
-
4. The **Path Based Access Restrictions** section allows for applying access restrictions to a single environment.
155
-
156
-
{{% alert color="info" %}}
157
-
158
-
* The top-level path (`/`) restricts access to the entire application
159
-
* The settings for specific paths override the implicitly inherited profile for the top level
160
-
* Besides being able to apply a customized access restriction profile, there are also presets available for simply allowing or denying all access
161
-
162
-
{{% /alert %}}
163
-
164
-
### Default Settings
165
-
166
-
These are the default settings:
167
-
168
-
* When deploying a deployment package to an environment using the **Deploy** or **Transport** functionality, paths representing known functionality in the Mendix version that is used are automatically added to the list of paths
169
-
* All paths ending in `-doc` have a preset **Deny all access** profile set by default
170
-
* All the remaining paths have no restriction applied by default
171
-
172
-
## Applying IP Restriction to an Application Environment
171
+
### Applying IP Restriction to an Application Environment
173
172
174
173
To apply IP restrictions to a specific application environment, follow these steps:
175
174
176
175
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
177
176
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
178
177
3. Go to the **Network** tab.
179
-
4.The **IP Access Restrictions** section allows for applying access restrictions to a single environment.
178
+
4.Navigate to the **IP Access Restrictions** section to apply access restrictions to a single environment.
180
179
181
180
{{% alert color="info" %}}
182
181
Following the migration from Cloud Foundry to Kubernetes, access rule violations are now logged in the **Access Log** instead of the **App Log**. For more details on logs, refer to the [Apps Deployed to Mendix Cloud](/developerportal/operate/logs/#apps-deployed-to-mendix-cloud) section of *Logs*.
183
182
{{% /alert %}}
184
183
185
-
## Use Cases for Access Restrictions
184
+
## Use Cases {#use-cases-for-access-restrictions}
186
185
187
186
Two scenarios in which you can use access restrictions are described below.
0 commit comments