Define Login Restrictions - Optional
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Define Login Restrictions - Optional

  • Dark
    Light
  • PDF

Article summary

Configure this task to limit users to a maximum number of parallel sessions per user ID. Exceeding the maximum number will result in a message indicating that the user has exceeded the maximum number of sessions and return the user to the login page.

Planful allows a user ID to be logged in from multiple locations and multiple devices. Administrators have the option to restrict the number of parallel sessions a user is logged into in order to comply with security policies.

Access the Configuration Task List page by navigating to Maintenance > Admin > Configuration Tasks. Select Define Login Restrictions - Configure IP Restrictions.

Note:
Restricting sessions based on login ID is not applicable for Offline Planning, and web services authentications.


This configuration is optional and is applicable to login requests from a web browser only. By default, no restrictions are configured.

  1. Select the Enable IP Restrictions checkbox.

  2. Select the Exempt All External User(s) checkbox so that external users are not required to meet IP address restrictions. For example, if you need a Planful Support employee to access your application, that person is considered an external user. For a list of external users, access the User Management page under Maintenance.

  3. For Add IP address, enter the address or address range you want to restrict. Enter an IP address (IP4 format), range of IP addresses, or CIDR (Classless Inter-Domain Routing) in which you want to restrict access to your Planful application.

Note:
Classless Inter-Domain Routing is a method for allocating IP addresses and routing Internet Protocol packets.
  1. Click the Add button to add the IP address, range of IP addresses, or CIDR to the Trusted IP addresses box. Users in this list logging in with a support IP address will be allowed to access Planful. If the IP address is not listed here, the user will be denied access. Select an IP address and click the Delete button to remove the address from the Trusted IP addresses box.

  2. To exempt specific users, use the Unmapped User/User Group and Mapped User/User Group columns.

  • Unmapped User/User Group – a list of all users and user groups. Select a user and click the forward arrow to provide that user or user group with exempted restriction.

  • Mapped User/User Group - a list of all users and user groups that are exempt from the restriction. To remove a user, select the user and click the back arrow.

Note:
An audit log entry is made for every session where a user is not able to login as a result of exceeding the maximum number of sessions allowed.

Was this article helpful?