You have the ability to manage access to your system by configuring IP whitelisting, which restricts Shape’s access to specific IP addresses. This security feature allows you to define which user roles can access your system based on their location. By implementing IP whitelisting, you can ensure that only authorized users from designated IP addresses can access your Shape system, bolstering the overall security of your organization.
To access the IP Whitelisting settings page, begin by clicking on “Settings” in the top navigation bar. Next, open the “Users & Permissions” dropdown menu, where you will find the option for “IP Whitelisting.” Simply click on it to navigate to the IP Whitelisting settings page, where you can configure and manage the whitelist of IP addresses allowed to access your system.
IP Whitelisting: https://secure.setshape.com/ip-whitelisting
If you wish to limit login access to specific IP locations for particular user roles, you can easily achieve this by toggling the “Enable IP validation for login” option located in the upper right-hand corner. By enabling this feature, you can enforce stricter security measures by allowing only authorized IP addresses for login purposes, providing an additional layer of protection for your system.
To customize the IP validation settings for different user roles, simply select the specific user roles to which you want the validation to apply.
This flexibility allows you to tailor the IP restrictions according to your organization’s requirements.
For instance, if you’re an admin who prefers unrestricted access to Shape, you can choose not to apply IP restrictions to your own role while applying them to your employees’ roles, ensuring limited workplace access to Shape for enhanced security measures.
To grant access to specific IP addresses for your system, utilize the “Add New IP” option. Simply click on it, and then enter the desired IP addresses that you wish to provide access to. This allows you to define a whitelist of approved IP addresses, ensuring that only authorized sources are granted access to your system while restricting access from other IP addresses.
By enabling IP validation for login and selecting the desired user roles, you can enforce stricter access control for your Shape instance. Add the whitelisted IP addresses that are allowed to access your system. If IP validation is turned on and enabled for specific user roles, any login attempts from non-whitelisted IP addresses will be denied, providing an added layer of security to protect your system and sensitive data.
To enhance security, Shape employs automatic blocking of traffic originating from regions known for frequent hacking attempts. If you have a user who needs access to your CRM but their access is being blocked, please promptly contact email@example.com with the user’s IP address. Our support team will assist you in resolving the issue and ensuring that the authorized user can access the CRM without interruption.
IP whitelisting in Shape allows you to grant access to specific IP addresses, ensuring that only authorized IPs can access your system. By enabling IP validation, only the IP addresses included in the whitelist will be able to log in and access Shape, while any IP not on the list will be denied access. This feature enhances the security of your system by restricting access to approved IP addresses, providing an additional layer of protection against unauthorized access.
Absolutely! If you wish to block inbound callers from specific numbers, you can easily do so by visiting the following link:
This feature allows you to manage and maintain a block list, ensuring that calls from undesired numbers are prevented from reaching your system.
If you’re unable to access your account and receiving a message indicating that your IP is not included on the approved list, it’s recommended to reach out to our support team at firstname.lastname@example.org. They will be able to assist you in resolving the issue and help you regain access to your account promptly.
Keywords: IP, whitelist, whitelisting, security, restrict access, unauthorized, IP address, block access