Skip to main content

Restrict Access by IP Range

To prevent unauthorized access from unapproved regions or devices, enable an IP allowlist to block user access based on source IP.

注意

This security control should be considered an additional layer in your defense-in-depth strategy. It should not be considered a primary defense.

How to Enable the Feature

To enable this feature, you must contact your Alteryx representative.

Enabling the feature may take one or two business days. Once enabled, new settings will be made available to your account.

Configuration

Step 1: Identity Source IPs

Consult your network administrator to obtain the list of source IPs that your users will use when accessing Alteryx.

Step 2: Identity Data Plane IPs

For workspaces that have not been configured for a private or dedicated data plane:

  1. Navigate to 将 Alteryx Service 的 IP 地址范围列入允许列表.

  2. Copy and note the Data Plane IP Addresses for your region. You will use these later.

警告

Do not include your region’s Control Plane IP Addresses. This could result in unintended access to your account.

For workspaces configured to use a Dedicated Data Plane (PDP) managed by Alteryx:

  1. Navigate to your workspace’s Admin Console > Private Data Handling > Processing page.

  2. Copy and note the list of Gateway IP Addresses. You will use these later.

For workspaces configured to use Private Data Plane (DDP) managed by your organization:

  • Consult your network administrator to obtain the NAT (Network Address Translation) IPs for the Azure/GCP/AWS account supporting your Alteryx workspace. You will use these later.

注意

If two or more data planes support the workspaces under your account, you should capture the IPs used by each data plane.

Step 3: Register IPs

  1. Navigate to your account’s Admin Console > Settings page.

  2. Edit the Restrict Access by IP Range setting.

  3. Within the Whitelisted IPs field, enter a comma separated list of your organization’s source IPs and data plane IPs.

  4. Select Save.

注意

You cannot update the Whitelisted IP field if the list does not include your own source IP. This helps ensure at least one user from your organization can access Alteryx once enabled.

Inputs are validated before the setting is persisted:

  • Only IPv4 is accepted.

  • Only RFC4632-compliant ranges are accepted.

  • Zero or more IPs and ranges can be entered, separated by a comma.

  • A range can be a single IP.

  • Whitespace is not accepted.

  • Example valid inputs:

    198.51.2.0

    198.51.2.0/24,198.51.5.0/4

Enforcement

Once the feature has been enabled and configured, if the user’s browser sessions or API calls come from a source IP that does not match the IPs and/or CIDR ranges registered, authentication will fail and access will be blocked. This change is enforced across the account, including any and all workspaces under the account.

How to Disable the Feature

To disable this feature, contact your Alteryx representative.

Disabling the feature may take one or two business days. Once disabled, source IP will no longer be evaluated when authenticating a user’s browser or API access.