Trusted Logins

What are Trusted Logins and how can we configure them in the emSigner application?

Trusted Logins provide users with the ability to designate certain IPs, streamlining the usage of the application from these designated IPs only. The Administrator has to define their own range of IP addresses that are to be marked as valid. By allowing access only from trusted IP ranges, organizations can mitigate the risk of unauthorized access from unknown or potentially malicious sources.

Below are the steps to configure the Trusted Login rules in the emSigner application.

Steps to configure the Trusted Logins in emSigner

Step 1: Login to emSigner Super Admin account. Click on ‘Settings’ tab to open the Admin Settings.

Step 2: Click on the 'Trusted Logins' tile to open the list of Trusted Login rules that are defined for the users under this account.

Step 3: Click on 'Create New' to create a New Trusted Login rule.

Step 4: Providethe details like the Rule Name, Start IP Address, End IP Address and save the details. The administrator has the provision to get their current IP Address using the link shown in the screen.

Step 5: Once all the details are saved, the success message will be shown indicating that the New rule is created successfully.

The Administrator has the ability to Edit or Delete the rules using the Pen and the Bin icons.

Last updated

Copyright emSigner 2023