Skip to content

Commit f8f9b6e

Browse files
feat: updating doc per release update
1 parent 6c90665 commit f8f9b6e

File tree

1 file changed

+33
-8
lines changed

1 file changed

+33
-8
lines changed

content/en/docs/deployment/mendix-cloud-deploy/access-restrictions.md

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ When configuring an access restriction profile, keep the following consideration
3232

3333
* Access restriction profiles are configured at the application level. They can be reused in all the environments (for example test, acceptance, production) of an app.
3434
* Access restriction profiles can contain any number of IPv4 address ranges, client CAs, or both.
35-
* If an access restriction profile contains both IP address ranges and client CAs, then any match on either the IP range or the client certificate will grant access.
35+
* If an access restriction profile contains both IP address ranges and client CAs, then any match on either the IP range or the client certificate will grant or deny access.
3636

3737
### Configuring Access Restriction Profiles {#access-restriction}
3838

@@ -54,7 +54,7 @@ To rename an access restriction profile. follow these steps:
5454
1. Locate the profile of interest from the **Access Restriction Profiles** page.
5555
2. Click the **More Options** ({{% icon name="three-dots-menu-horizontal" %}}) icon.
5656
3. Click **Edit**.
57-
4. In the edit page enter the new name.
57+
4. In the edit page enter the new **Profile Name**.
5858
5. Click **Save** to apply your changes.
5959

6060
#### Specifying TLS Client Certificate Verification
@@ -81,14 +81,39 @@ Click **Save** to save the current certificate profile.
8181
Your CA for TLS client certificate verification should be different from the CA used to sign the SSL certificate configured for any custom domain of the app. Using the same CA for both can result in browsers requesting client certificates on all paths of your application.
8282
{{% /alert %}}
8383

84-
#### Specifying IP Ranges {#ip-ranges}
84+
#### Configuring Allowed IP Ranges {#ip-ranges}
8585

86-
You can specify a number of different IP ranges. Click **Create New Profile** to add a new IP range, or use **Edit** or **Delete** to modify an existing IP range.
86+
You can define IP profiles to specify which IP addresses or ranges are explicitly allowed to access your application.
8787

88-
For each IP range, you can do the following:
88+
To manage these profiles:
8989

90-
* Enter a **Profile Name**
91-
* Specify a range of addresses. Mendix Cloud supports both IPv4 and IPv6 format addresses.
90+
* In the **IP Filtering Profiles** section, click **Create New Profile** to add a new IP range.
91+
* To modify an existing profile, select it and click **Edit**({{% icon name="pencil" %}}).
92+
* To delete a profile, select it and click **Delete**({{% icon name="trash-can" %}}).
93+
94+
For each profile, specify the following details:
95+
96+
* **Profile Name**: Enter a descriptive name for the IP range
97+
* **IPv4/IPv6 range**: Enter the specific IP address range. Mendix Cloud supports both IPv4 and IPv6 formats
98+
99+
Requests originating from an IP address within these allowed profiles will be granted access to your application.
100+
101+
#### Configuring Denied IP Ranges {#denied-ip-ranges}
102+
103+
You can define IP profiles to specify which IP addresses or ranges are explicitly denied access to your application.
104+
105+
To manage these profiles:
106+
107+
* In the **Denied IP Profiles** section, click **Create New Profile** to add a new IP range.
108+
* To modify an existing profile, select it and click **Edit**({{% icon name="pencil" %}}).
109+
* To delete a profile, select it and click **Delete**({{% icon name="trash-can" %}}).
110+
111+
For each profile, specify the following details:
112+
113+
* **Profile Name**: Enter a descriptive name for the IP range
114+
* **IPv4/IPv6 range**: Enter the specific IP address range. Mendix Cloud supports both IPv4 and IPv6 formats
115+
116+
Requests originating from an IP address within these denied profiles will be blocked from accessing your application.
92117

93118
## Applying a Restriction to an Application Environment
94119

@@ -130,7 +155,7 @@ To restrict access to the app to an IP range, follow these steps:
130155
3. Switch to the **Access Restriction Profiles** tab.
131156

132157
4. Create an access restriction profile.
133-
5. Add one or more IP ranges to the access restriction profile.
158+
5. Add one or more IP ranges to the **Denied IP Profiles**.
134159

135160
6. Save the access restriction profile.
136161
7. Go to the **Deploy** tab of the **Environments** page. Click **Details** ({{% icon name="notes-paper-edit" %}}) on the desired environment.

0 commit comments

Comments
 (0)