Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

A comma separated list of IP addresses and ranges (in CIDR notation), which define the closed (protected, secure) environment. According to these all sent packages are classified and assigned a "source", either in the closed environment or outside it (in an open environment). Similarly, when a user is accessing a package, a "target" is evaluated, based on the IP address from which the user is accessing the package. Whether the user's access to the package is allowed, is determined by the pair "source" → "target" and the settings below.

If any addresses or ranges for the closed environment are set, all users of the application will see a lock icon on the right side of the top bar. The icon will either be an unlocked or locked lock, representing whether the environment the user is currently in is open or closed.

Allow closed → closed transfer

...