AKKU

Access Management

Overview

The Access Manager module enables administrators to define and enforce access policies for users and applications based on various conditions, including IP address, time range, device, location, VPN usage, and mobile device policies.

This module ensures your organization's data is accessed only under trusted and compliant conditions.

Navigation Path

Dashboard
Access Management
Screenshot
Access Management Interface

Access Management Features

When you land on the Access Manager dashboard, you will see a list of available access rules based on IP Restriction, Time Parameters, Device Restriction, Geo-Fencing, VPN Detector, and Mobile Device Management.

Note: For restrictions being set up for the first time, you will see a “Configure” button, and for restrictions that have already been configured, you will see a “Manage” button on the Access Manager dashboard.

IP Restriction

Specify which IP addresses can access your data

Screenshot
Access Manager
1

Enter IP Basic Details

Policy FieldConfiguration Details
NameEnter a unique name for the IP policy
DescriptionEnter a brief description of the policy
Choose type for IPSelect from the options below: Whitelist IP - Allow access only from these IPs Blacklist IP - Deny access from these IPs
Screenshot
Access Manager IP
2

IP Range Specification

Network ParameterConfiguration Guide
RangeDefine IP ranges
IPv4 / IPv6Enter the IPv4 or IPv6 details - both are supported
LocationEnter the location tag (optional)
Assign toAssign the rule to the organization, to groups, or to users

Use the (+) or (-) buttons to Add or Remove in case of multiple entries

Screenshot
Access Manager IP

Click “Next” to set up the IP-based access restriction assign to Organization or Group or Users.

Screenshot
Access Manager IP

Time Parameters

Stipulate at what times your data can be accessed

Screenshot
Access Manager Configure

Enter Time Parameters details

Time Rule FieldConfiguration Guide
NameEnter the name of the time rule
DescriptionEnter a description (optional)
Select ZoneSelect the time zone
Select RangeSelect the start and end time
Assign toAssign the rule to the organization, to groups, or to users

Use the (+) button to include multiple time ranges.

Screenshot
Access Manager Configure

Click “Save” to set up the Time Parameter-based access restriction.

Device Restrictions

Bind your devices to your data

Screenshot
Device Restriction Interface
1

User Selection

A table of all users is displayed with:

User AttributeDescription
NameName of the User
EmailEmail of the User
Device Authorization StatusAuthorize the user

You can:

  • Search by User
  • Select a User
  • Click Authorize to whitelist a device, or Cancel or Exit
Screenshot
Device Restriction Panel
Note: Once you click on the Authorize button, a pop-up will appear with the message “An email will be sent to the selected users with instructions on how to install the device manager service”

Click on the “Send Instruction” button to proceed

Screenshot
Send Instructions
2

A Screenshot of the email is shown below

Screenshot
Email ScreenShot Image
NOTE: If we need we can Upload bulk Device List and Add Device manually by clicking Upload device and Add Device for applying device restrictions for a particular user or bulk users
3

Device Configuration

  • Upload Device List: An administrator uploads a CSV file containing a list of device details (serial number, UUID, type) and their assigned users to add multiple devices at once.

  • Add Device: An administrator manually enters the serial number, UUID, device type, and assigned user(s) into a form to add a single device to the system.

Screenshot
Upload Device Interface
Screenshot
Upload Device Interface
Screenshot
Add Device Interface

Geo-Fencing

Prevent unauthorized access and reduce data exposure based on location

Screenshot
Geo Fencing Interface

Enter Geo Location rule details

Geolocation FieldConfiguration Guide
NameEnter the name of the geolocation rule
CountrySelect a country from the dropdown
CitySelect a city (based on the selected country)
Assign toAssign the rule to the organization, to groups, or to users

A map interface is also included on the right for visual geolocation selection

Click “Save” to set up the Geo Location-based access restriction

Screenshot
Geo Fencing Setup Interface

VPN Detector

Detect VPN usage to prevent unauthorized access and reduce data exposure

Screenshot
VPN Detector

Enter VPN Detector rule details

Rule FieldConfiguration Details
NameEnter the name of the rule
DescriptionEnter a description (optional)
Assign toAssign the rule to the organization, to groups, or to users

Click “Save” to set up the VPN Detector-based access restriction

Screenshot
VPN Restriction

Mobile Device Management (MDM)

Control and secure access from mobile devices.

Screenshot
MDM Interface

Enter Mobile Device Management rule details

FieldInstruction
NameEnter the name of the rule
DescriptionEnter a description (optional)
Assign toAssign the rule to the organization, to groups, or to users

Click “Save” to set up the Mobile Device Management-based access restriction

Screenshot
MDM Configure

Edit or Delete Access Rules

We can easily edit or delete the access rules by clicking manage on the particular restriction

  • Each rule can be edited or deleted using the options alongside it.
  • Toggle the Status switch to activate or deactivate an access restriction.
  • Click on the Delete icon under Action to delete an access restriction.
  • We can do the necessary steps for each restriction as follows if we want.
Screenshot
IP Restriction