Skip to content

Commit 4bdf4cd

Browse files
Access restriction updates for Oct 9 release
1 parent 83d1942 commit 4bdf4cd

File tree

1 file changed

+32
-33
lines changed

1 file changed

+32
-33
lines changed

content/en/docs/deployment/mendix-cloud-deploy/access-restrictions.md

Lines changed: 32 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -98,25 +98,49 @@ For each profile, specify the following details:
9898

9999
Requests originating from an IP address within these allowed profiles will be granted access to your application.
100100

101+
### Applying Access Restriction to an Application Environment
102+
103+
To apply access restrictions to a specific application environment, follow these steps:
104+
105+
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
106+
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
107+
3. Go to the **Network** tab.
108+
4. Navigate to the [Path Based Access Restrictions](/developerportal/deploy/environments-details/#path-based-restrictions) section to apply access restrictions to a single environment.
109+
110+
{{% alert color="info" %}}
111+
112+
* The top-level path (`/`) restricts access to the entire application
113+
* The settings for specific paths override the implicitly inherited profile for the top level
114+
* Besides being able to apply a customized access restriction profile, there are also presets available for simply allowing or denying all access
115+
116+
{{% /alert %}}
117+
118+
#### Default Settings
119+
120+
These are the default settings:
121+
122+
* When deploying a deployment package to an environment using the **Deploy** or **Transport** functionality, paths representing known functionality in the Mendix version that is used are automatically added to the list of paths
123+
* All paths ending in `-doc` have a preset **Deny all access** profile set by default
124+
* All the remaining paths have no restriction applied by default
125+
101126
## IP Restriction Profiles {#ip-restriction-profiles}
102127

103-
Ip Restriction profiles allows you to deny access to specific ip or ip ranges to your application.
104-
You can specify multiple ip restriction profiles for your application, each with a descriptive name that reflects its purpose.
128+
IP restriction profiles allow you to deny access to your application from specific IP addresses or IP ranges. You can configure multiple profiles, each with a descriptive name that clearly reflects its purpose.
105129

106-
To view or manage ip restriction profiles, follow these steps:
130+
To view or manage IP restriction profiles, follow these steps:
107131

108132
1. From [Apps](https://sprintr.home.mendix.com), go to your app's **Environments** page.
109133
2. Click **Cloud Settings** ({{< icon name="settings-slider-1" >}}) from any of the [available tabs](/developerportal/deploy/environments/#available-tabs) to open the **Manage Cloud Settings** page.
110134
3. Switch to the **IP Restriction Profiles** tab.
111135

112-
When configuring an ip restriction profile, keep the following considerations in mind:
136+
When configuring an IP restriction profile, keep the following considerations in mind:
113137

114138
* IP restriction profiles are configured at the application level. They can be reused in all the environments (for example test, acceptance, production) of an app.
115139
* IP restriction profiles can contain any number of IPv4 or IPv6 address ranges
116140

117141
### Configuring IP Restriction Profiles {#access-restriction}
118142

119-
To configure ip restriction profiles, from the **IP Restriction Profiles** page, you can either:
143+
To configure IP restriction profiles, from the **IP Restriction Profiles** page, you can either:
120144

121145
* Create a new profile by clicking **New Profile**
122146
* Modify an existing profile by selecting the profile:
@@ -144,45 +168,20 @@ For each profile, specify the following details:
144168

145169
Requests originating from an IP address within these denied profiles will be blocked from accessing your application.
146170

147-
## Applying Access Restriction to an Application Environment
148-
149-
To apply access restrictions to a specific application environment, follow these steps:
150-
151-
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
152-
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
153-
3. Go to the **Network** tab.
154-
4. The **Path Based Access Restrictions** section allows for applying access restrictions to a single environment.
155-
156-
{{% alert color="info" %}}
157-
158-
* The top-level path (`/`) restricts access to the entire application
159-
* The settings for specific paths override the implicitly inherited profile for the top level
160-
* Besides being able to apply a customized access restriction profile, there are also presets available for simply allowing or denying all access
161-
162-
{{% /alert %}}
163-
164-
### Default Settings
165-
166-
These are the default settings:
167-
168-
* When deploying a deployment package to an environment using the **Deploy** or **Transport** functionality, paths representing known functionality in the Mendix version that is used are automatically added to the list of paths
169-
* All paths ending in `-doc` have a preset **Deny all access** profile set by default
170-
* All the remaining paths have no restriction applied by default
171-
172-
## Applying IP Restriction to an Application Environment
171+
### Applying IP Restriction to an Application Environment
173172

174173
To apply IP restrictions to a specific application environment, follow these steps:
175174

176175
1. From [Apps](https://sprintr.home.mendix.com), go to the app's **Environments** page.
177176
2. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.
178177
3. Go to the **Network** tab.
179-
4. The **IP Access Restrictions** section allows for applying access restrictions to a single environment.
178+
4. Navigate to the **IP Access Restrictions** section to apply access restrictions to a single environment.
180179

181180
{{% alert color="info" %}}
182181
Following the migration from Cloud Foundry to Kubernetes, access rule violations are now logged in the **Access Log** instead of the **App Log**. For more details on logs, refer to the [Apps Deployed to Mendix Cloud](/developerportal/operate/logs/#apps-deployed-to-mendix-cloud) section of *Logs*.
183182
{{% /alert %}}
184183

185-
## Use Cases for Access Restrictions
184+
## Use Cases {#use-cases-for-access-restrictions}
186185

187186
Two scenarios in which you can use access restrictions are described below.
188187

0 commit comments

Comments
 (0)