IP restrictions allow you, as an administrator, to control which IP addresses can be used to log in to VanillaSoft. This adds an extra layer of security to your VanillaSoft account. Even if someone gains unauthorized access to a user's credentials, they won't be able to log in unless they are trying from a pre-approved location based on their IP address.
Before You Begin
- IP restrictions only apply to login attempts made through VanillaSoft.net and do not affect VS Connect.
- This feature requires administrator access to your VanillaSoft account.
Configuring Allowed IP Addresses
- Navigate to the Users section: Log in to VanillaSoft as an Administrator and navigate to the Users section from the top menu.
- Access IP Restrictions: Within the Users section, locate the IP Restrictions section near the top of the page.
-
Add Allowed IP Addresses:
- Enter the public IP address you want to allow access from. You can find your public IP address by visiting a site such as WhatIsMyIP.com.
- Click "Add" to add the IP address to the list.
- Repeat for all the IP addresses you want to grant access to.
- Save Changes: Once you've added all the desired IP addresses, click "Save" to apply the restrictions.
Configuring Users with No IP Restrictions
There may be cases where you want specific users to be exempt from IP restrictions. Here's how to do that:
- Navigate to the Users section: Log in to VanillaSoft as an Administrator and navigate to the Users section from the top menu.
- Access IP Restrictions: Within the Users section, locate the IP Restrictions section near the top of the page.
-
Select User and Add:
- Open the "Select User" drop-down and choose the user you want to exempt.
- Click "Add" to exempt them from the IP restrictions.
- Repeat for all users who don't require IP restrictions.
- Save Changes: Click "Save" to apply the changes.
IP restrictions are a valuable tool for enhancing the security of your VanillaSoft account. Limiting login access to authorized IP addresses can significantly reduce the risk of unauthorized access even if user credentials are compromised.