Configure Access Settings
β οΈ The annual cost of maintaining the server where this website is hosted, the domain, and keeping it up-to-date is approximately β¬3,000 per year. Help us with a small donation to cover these expenses. Support Now!
Limit access based on IP addresses. If you don't provide a allowlist or blocklist, the feature isn't active and these settings have no effect.
Business Manager IP allowlists and blocklists serve to lock out attackers who have, though illegitimate means, obtained valid credentials. For example, a former employee who obtained credentials when employed, or non-employees who obtained them via social engineering. These lists aren't intended to prevent brute force attacks.
If you log into Business Manager, and you aren't using Unified Authentication, these lists apply before your credentials are verified.
If you log in using WebDAV or the agent user login process, and you aren't using Unified Authentication, the lists apply after your credentials are verified.
If you log in using Unified Authentication, regardless of how you log in, these lists apply after your credentials are verified.