Perimeter Access Control Subtask

Use this subtask to configure Perimeter Access Controls to enhance the security of your Costpoint applications, ensuring that access is restricted based on IP ranges and security certificates. This additional layer of security helps protect sensitive data and ensures compliance with organizational policies.

Contents

Field Description
Product Select the product to which the rule will apply. Selecting All applies the rule to all products.
Application Enter, or click to select, the specific application for the rule. If no application is selected, the rule applies to all applications within the chosen product.
Application Name This field displays the name of the application.
IP Range (CIDR - ipV4/ipV6) Enter the IP range using CIDR notation (e.g. - IPv4: 192.168.1.0/24 or IPv6: 2001:db8::/32). If this field is left empty, it will not be validated.
Certificate CN Enter the Certificate Common Name (CN). Requirements:
  • Must be a valid domain name ('example.com' or 'www.example.com').
  • For internal certificates, it can be an IP address (192.168.1.1), hostname (server01), or user identifier (john.doe@example.com).
  • Wildcard certificates must follow the format '*.example.com'.
  • Only alphanumeric characters, dots (.), hyphens (-), and an asterisk (*) for wildcards are allowed.
  • Maximum length of 255 characters.
Description Provide a description for the rule.