Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
security [2019_06_18 16:16] – [2 Encrypted Data in Motion] jimsecurity [2019_10_15 20:46] – [6 Access Control Security] steven
Line 57: Line 57:
  
 ===== 6 Access Control Security ===== ===== 6 Access Control Security =====
- 
- 
  
 {{:/security:steps:sme_6_access_control_secur.png}} {{:/security:steps:sme_6_access_control_secur.png}}
Line 64: Line 62:
 The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used.
  
 +===== 7 Restrict by IP =====
  
 +The File Fabric supports the ability to whitelist or blacklist IP addresses. This can be done at the Organization level (tenant) or on a per user basis. For more information see [[geoip]].
 ===== 7 Audit Security ===== ===== 7 Audit Security =====