Skip to content

Latest commit

 

History

History
52 lines (33 loc) · 2.55 KB

faqs-cbr.md

File metadata and controls

52 lines (33 loc) · 2.55 KB
copyright lastupdated keywords subcollection content-type
years
2021, 2022
2022-07-21
frequently asked questions, cbr faqs, cbr and iam, context-based restrictions, access restrictions
account
faq

{{site.data.keyword.attribute-definition-list}}

FAQs about Context-based restrictions

{: #cbrfaq}

FAQs for {{site.data.keyword.cloud}} Context-based restrictions might include questions about access restrictions for {{site.data.keyword.cloud_notm}} resources. {: shortdesc}

To find all FAQs for {{site.data.keyword.cloud}}, see our FAQ library.

What are {{site.data.keyword.cloud_notm}} Context-based restrictions?

{: #whatiscbr} {: faq} {: support}

As an account owner or administrator, you can define and enforce access restrictions for {{site.data.keyword.cloud}} resources based on the network location of access requests by enabling context-based restrictions. For more information, see What are context-based restrictions?.

How do you use Context-based restrictions and IAM policies together?

{: #iam-cbr-diff} {: faq}

These restrictions work with traditional IAM policies, which are based on identity, to provide an extra layer of protection. Since both IAM access and context-based restrictions enforce access, context-based restrictions offer protection even in the face of compromised or mismanaged credentials.

Unlike IAM policies, context-based restrictions don't assign access. Context-based restrictions check that an access request comes from an allowed context that you configure. {: note}

What's the difference between Context-based restrictions and allowed IP addresses?

{: #ip-cbr-diff} {: faq}

Context-based restrictions enforce access restrictions at the individual service level and access is evaluated when a user attempts to access a resource. Allowed IP address restrict access at the account level, which is evaluated at login.

How can I make sure that my rule doesn't break an access flow?

{: #monitor-cbr-faq} {: faq}

As an administrator, you manage users, applications, and workflows that depend on having the right access when they need it. To make sure that your context-based restrictions rules don't brake an access flow, set the rule to report-only mode for at least 30 days before you enable the rule. This way, you can monitor the impact of the rule on your access flows, such as when access is denied or allowed and for which identities. For more information, see Monitoring context-based restrictions.