Setup and administration of IP Allow List.

IP Allow List, which is part of the add-on service iconik Shield, allows you to configure which IP addresses or CIDR-prefixes from which users are allowed to access iconik from. The filtering can be applied either for an individual user, for certain user groups or globally for your iconik account. The filters you set applies to logged in users but not to external shares.

iconik shield

Adding IP Allow List Entries

IP Allow Lists can be applied either for all users in your iconik account, to a certain user group or to an individual user.

Add a Global IP Allow List Entry

  1. Click on ADMIN in the top navigation.
  2. Choose Settings from the left navigation bar.
  3. This will show the System Settings
  4. Open the iconik Shield tab.
  5. Enable iconik Shield if it is not already enabled. There is an associated monthly price to enabling iconik Shield.
  6. Click on button.
  7. A modal window opens.
  8. Enter an IP address on the form xxx.xxx.xxx.xxx or a network on the form xxx.xxx.xxx.xxx/yy which users should be allowed to access from.
  9. Either select an application this IP Allow List Entry should apply to, or leave empty for All Applications.
  10. Click

Add a Group IP Allow List Entry

  1. Click on ADMIN in the top navigation.
  2. Choose Groups from the left navigation bar.
  3. Click on the group you want to edit.
  4. Open the Permissions Settings tab.
  5. Click on button.
  6. A modal window opens.
  7. Enter an IP address on the form xxx.xxx.xxx.xxx or a network on the form xxx.xxx.xxx.xxx/yy which users should be allowed to access from.
  8. Either select an application this IP Allow List Entry should apply to, or leave empty for All Applications.
  9. Click

Add a User IP Allow List Entry

  1. Click on ADMIN in the top navigation.
  2. Choose Users from the left navigation bar.
  3. Click on the user you want to edit.
  4. Open the Permissions Settings tab.
  5. Click on button.
  6. A modal window opens.
  7. Enter an IP address on the form xxx.xxx.xxx.xxx or a network on the form xxx.xxx.xxx.xxx/yy which users should be allowed to access from.
  8. Either select an application this IP Allow List Entry should apply to, or leave empty for All Applications.
  9. Click

Learn more