Perimeter Access Control Subtask
Use this subtask to configure Perimeter Access Controls to enhance the security of your Costpoint applications, ensuring that access is restricted based on IP ranges and security certificates. This additional layer of security helps protect sensitive data and ensures compliance with organizational policies.
Contents
| Field | Description |
|---|---|
| Product | Select the product to which the rule will apply. Selecting All applies the rule to all products. |
| Application | Enter, or click
to select, the specific application for the rule. If no application is selected, the rule applies to all applications within the chosen product.
|
| Application Name | This field displays the name of the application. |
| IP Range (CIDR - ipV4/ipV6) | Enter the IP range using CIDR notation (e.g. - IPv4: 192.168.1.0/24 or IPv6: 2001:db8::/32). If this field is left empty, it will not be validated. |
| Certificate CN | Enter the Certificate Common Name (CN). Requirements:
|
| Description | Provide a description for the rule. |
Parent Topic: Security Settings Tab
to select, the specific application for the rule. If no application is selected, the rule applies to all applications within the chosen product.