Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
security [2019_06_18 16:16] – [2 Encrypted Data in Motion] jim | security [2019_10_15 20:46] – [6 Access Control Security] steven | ||
---|---|---|---|
Line 57: | Line 57: | ||
===== 6 Access Control Security ===== | ===== 6 Access Control Security ===== | ||
- | |||
- | |||
{{:/ | {{:/ | ||
Line 64: | Line 62: | ||
The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. | The File Fabric supports Access Control Permissions at a Role, User, or folder level for shared folders. The Permissions can be taken from Active Directory if single sign-on is being used. | ||
+ | ===== 7 Restrict by IP ===== | ||
+ | The File Fabric supports the ability to whitelist or blacklist IP addresses. This can be done at the Organization level (tenant) or on a per user basis. For more information see [[geoip]]. | ||
===== 7 Audit Security ===== | ===== 7 Audit Security ===== | ||