Access
Overview
The Advanced Workspace Settings provide powerful tools for administrators and workspace owners to customize and secure their workspace environment. This documentation page focuses on the "Access" functionality, where you can configure custom subdomains, network access, and enforce specific authentication methods. Additionally, we will explore other advanced settings that can enhance the control and security of your workspace.
Custom Subdomains
What are Custom Subdomains?
Create custom subdomains for your workspace.
How to Create a Custom Subdomain
Navigate to Workspace Settings:
Go to the "Settings" tab in your workspace.
Select "Advanced Settings" from the dropdown menu.
Custom Subdomain Configuration:
Under the "Custom Subdomains" section, enter your desired subdomain.
Click "Check Availability" to ensure the subdomain is not already in use.
Once verified, click "Save Changes" to apply the custom subdomain to your workspace.
Benefits of Custom Subdomains
Brand Consistency: Maintain your organization's branding and identity.
Professional Appearance: Enhance the professional look of your workspace.
Easy Access: Provide a memorable and easy-to-share URL for your users.
Network Access Control
Restrict Access by Network
To ensure that only authorized users can access your workspace, you can restrict access based on specific network conditions such as a particular Wi-Fi network or VPN.
How to Set Up Network Access Control
Navigate to Network Access Settings:
Go to the "Settings" tab in your workspace.
Select "Network Access" from the dropdown menu.
Configure Network Restrictions:
Add the IP addresses or IP ranges of the allowed networks.
Specify any VPN requirements, if applicable.
Click "Save Changes" to enforce these restrictions.
Benefits of Network Access Control
Enhanced Security: Prevent unauthorized access from unknown networks.
Controlled Environment: Ensure users are accessing the workspace from secure and approved locations.
Workspace-Approved Authentication Methods
Enforce Specific Authentication Methods
To further secure your workspace, you can enforce specific authentication methods for all users. The available methods include Google, Microsoft, Magic Link, and SAML SSO.
How to Enforce Authentication Methods
Navigate to Authentication Settings:
Go to the "Settings" tab in your workspace.
Select "Authentication" from the dropdown menu.
Select Required Authentication Methods:
Choose one or more authentication methods that users must use to log in.
Click "Save Changes" to apply these settings.
Available Authentication Methods
Google: Users can authenticate using their Google account.
Microsoft: Users can authenticate using their Microsoft account.
Magic Link: Users receive a secure link via email to log in.
SAML SSO: Users can authenticate through your organization's SAML SSO provider.
Benefits of Enforcing Authentication Methods
Increased Security: Ensure users are authenticated through trusted and secure methods.
Compliance: Meet organizational security policies and compliance requirements.
Additional Advanced Settings
IP Whitelisting
Enhance security by specifying a list of IP addresses that are allowed to access the workspace.
Custom User Roles (Coming Soon)
Create and manage custom user roles with specific permissions to control access to different parts of the workspace.
Last updated