1
0
mirror of https://github.com/Unleash/unleash.git synced 2025-11-10 01:19:53 +01:00

docs: explain that IP allow list is configured by us (#10896)

This commit is contained in:
Melinda Fekete 2025-10-31 11:53:30 +01:00 committed by GitHub
parent 7d2a5d0ed8
commit d721499bd4
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -108,7 +108,7 @@ Next, well explore how to extend access controls in Unleash for network secur
Securing your network layer is non-negotiable for building and using software systems. Its foundational knowledge and good practice for any organization with engineering teams deploying software. Now that you understand how to set up and manage users at scale in Unleash, you can begin configuring Unleash in your applications and services [using our SDKs](/reference/sdks#official-sdks). Securing your network layer is non-negotiable for building and using software systems. Its foundational knowledge and good practice for any organization with engineering teams deploying software. Now that you understand how to set up and manage users at scale in Unleash, you can begin configuring Unleash in your applications and services [using our SDKs](/reference/sdks#official-sdks).
Using the Admin UI is an easy, direct way to make changes to your feature flags, projects, rollout strategies, and more. But when youre making calls to our frontend API from your services, you can update cross-origin resource sharing (CORS) settings to control application access to Unleash. You can also set up IP allow lists to restrict access to Unleash. Using the Admin UI is an easy, direct way to make changes to your feature flags, projects, rollout strategies, and more. But when youre making calls to our frontend API from your services, you can update cross-origin resource sharing (CORS) settings to control application access to Unleash. To further restrict access, Unleash also supports [IP allow lists](#set-up-ip-allow-lists-for-enhanced-security).
### Set up CORS policies for Frontend API security ### Set up CORS policies for Frontend API security
@ -126,6 +126,8 @@ By default, this CORS origin list includes an asterisk (\*), meaning that any do
Enhance your network security with IP allow lists, which give your organization access control based on specific network parameters. This feature restricts all access to Unleash to only be used by certain IP addresses. For example, if youre using company VPNs or servers, you can add those IP addresses to the list to ensure they can access Unleash. Enhance your network security with IP allow lists, which give your organization access control based on specific network parameters. This feature restricts all access to Unleash to only be used by certain IP addresses. For example, if youre using company VPNs or servers, you can add those IP addresses to the list to ensure they can access Unleash.
If you need to update or review your allow list configuration, contact [Unleash support](https://www.getunleash.io/support).
Next, well explore change management as an important tool to further enhance access control mechanisms and make your workflows auditable. Next, well explore change management as an important tool to further enhance access control mechanisms and make your workflows auditable.
## Use a change management workflow for auditing ## Use a change management workflow for auditing