Access

Overview

The Advanced Workspace Settings provide powerful tools for administrators and workspace owners to customize and secure their workspace environment. This documentation page focuses on the "Access" functionality, where you can configure custom subdomains, network access, and enforce specific authentication methods. Additionally, we will explore other advanced settings that can enhance the control and security of your workspace.

Custom Subdomains

What are Custom Subdomains?

Create custom subdomains for your workspace.

How to Create a Custom Subdomain

  1. Navigate to Workspace Settings:

    • Go to the "Settings" tab in your workspace.

    • Select "Advanced Settings" from the dropdown menu.

  2. Custom Subdomain Configuration:

    • Under the "Custom Subdomains" section, enter your desired subdomain.

    • Click "Check Availability" to ensure the subdomain is not already in use.

    • Once verified, click "Save Changes" to apply the custom subdomain to your workspace.

Benefits of Custom Subdomains

  • Brand Consistency: Maintain your organization's branding and identity.

  • Professional Appearance: Enhance the professional look of your workspace.

  • Easy Access: Provide a memorable and easy-to-share URL for your users.

Network Access Control

Restrict Access by Network

To ensure that only authorized users can access your workspace, you can restrict access based on specific network conditions such as a particular Wi-Fi network or VPN.

How to Set Up Network Access Control

  1. Navigate to Network Access Settings:

    • Go to the "Settings" tab in your workspace.

    • Select "Network Access" from the dropdown menu.

  2. Configure Network Restrictions:

    • Add the IP addresses or IP ranges of the allowed networks.

    • Specify any VPN requirements, if applicable.

    • Click "Save Changes" to enforce these restrictions.

Benefits of Network Access Control

  • Enhanced Security: Prevent unauthorized access from unknown networks.

  • Controlled Environment: Ensure users are accessing the workspace from secure and approved locations.

Workspace-Approved Authentication Methods

Enforce Specific Authentication Methods

To further secure your workspace, you can enforce specific authentication methods for all users. The available methods include Google, Microsoft, Magic Link, and SAML SSO.

How to Enforce Authentication Methods

  1. Navigate to Authentication Settings:

    • Go to the "Settings" tab in your workspace.

    • Select "Authentication" from the dropdown menu.

  2. Select Required Authentication Methods:

    • Choose one or more authentication methods that users must use to log in.

    • Click "Save Changes" to apply these settings.

Available Authentication Methods

  • Google: Users can authenticate using their Google account.

  • Microsoft: Users can authenticate using their Microsoft account.

  • Magic Link: Users receive a secure link via email to log in.

  • SAML SSO: Users can authenticate through your organization's SAML SSO provider.

Benefits of Enforcing Authentication Methods

  • Increased Security: Ensure users are authenticated through trusted and secure methods.

  • Compliance: Meet organizational security policies and compliance requirements.

Additional Advanced Settings

IP Whitelisting

Enhance security by specifying a list of IP addresses that are allowed to access the workspace.

Custom User Roles (Coming Soon)

Create and manage custom user roles with specific permissions to control access to different parts of the workspace.

Last updated