Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Configuring Tenants for User Access and Privacy

You can set conditions for tenant access by:

  • specifying authorized IP addresses for user access,
  • entering session timeout information, and
  • choosing a time frame for login access to the support team.
    1. Select Administration > System Settings.
    2. Select Tenant Configuration from the menu.
    3. Configure the settings. When you have finished making changes, click Save. Authorized IP Addresses

      You can allow access to the tenant for only the IP addresses you authorize. When users with Application Administrator, Key Administrator, or Application Monitor roles want to sign in to the Management Console, the system checks their IP addresses against those authorized addresses.

  • If a match with a valid IP address is not found, sign-in is denied and the message Invalid IP user range is displayed.
  • If a match with a valid IP address is found, the user can sign in. To specify authorized IP addresses for access to the tenant:
    1. Click in the Authorized IP Addresses field.
    2. Use the Search function, or enter one or more IP addresses you want to authorize for access to the tenant, separated with commas.
    3. Click Save to close the entry box.

      This validation process does not apply for:

  • System Administrator, Operations Administrator, or Service Administrator sign
  • Login with IdP

    Session Timeout

    Enter a time (in minutes, any number between 1 and 120) after which a session expires, requiring another sign-in. The default value is 30 minutes.

    Grant Tenant Login Access

    System administrators and application administrators can enable or disable access to Support by service administrators and operations administrators. You can deny access or select the number of days of available access.

    In the Support field, select an option. The default selection is No Access. You can also select access for 1 day, 3 days, or 1 week.

    Reassignment of Super Administrator

    For details on this option, refer to Reassign the Super Administrator role.

    User Privacy

    Refer to Configuring PII Anonymization in the Management Console