Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security [2019_06_18 16:13] – [6 Access Control Security] jim | security [2019_10_15 20:46] – [6 Access Control Security] steven | ||
---|---|---|---|
Line 19: | Line 19: | ||
Administrators should also connect to storage providers using HTTPS. For storage providers with a fixed endpoint including AWS S3, Azure, Google Cloud Storage the File Fabric always uses HTTPS. | Administrators should also connect to storage providers using HTTPS. For storage providers with a fixed endpoint including AWS S3, Azure, Google Cloud Storage the File Fabric always uses HTTPS. | ||
+ | [[https:// | ||
===== 3 Encryption Algorithm ===== | ===== 3 Encryption Algorithm ===== | ||
Line 56: | Line 57: | ||
===== 6 Access Control Security ===== | ===== 6 Access Control Security ===== | ||
- | |||
- | |||
{{:/ | {{:/ | ||
Line 63: | Line 62: | ||
The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. | The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. | ||
+ | ===== 7 Restrict by IP ===== | ||
+ | The File Fabric supports the ability to whitelist or blacklist IP addresses. This can be done at the Organization level (tenant) or on a per user basis. For more information see [[geoip]]. | ||
===== 7 Audit Security ===== | ===== 7 Audit Security ===== | ||