Remote access rule

You can limit which applications are available to users when they remotely access Garoon.
If user attempts to remotely access an application that is not allowed to use, that application will not be displayed and the user cannot use that application.
Here we describe the way to limit remotely accessible applications.
After setting the "Remote access rule", you can set applications to allow remote access.

Steps:
  1. Click the Administration menu icon (gear icon) in the header.

    The gear-shaped icon appears only on the screen for the users with administrative privileges.

  2. Click Garoon System Administration.

  3. Select "Basic system administration" tab.

  4. Click Applications.

  5. Click Application users.

  6. On the "Application users" screen, click Details in "Remote access rule". Image of the 'Details' link which is surrounded by the red rectangle box

  7. On the "Remote access rule details" screen, click Change. Image of the change link surrounded by the red rectangle box

  8. On the "Change remote access rule" screen, set whether to restrict remote access.

    The setting fields are as follows:

    • Allow all:
      The default value is "Allow all". Select this option if you do not want to limit remote access to applications.
    • Control with IP address:
      Select this option if accesses from IP addresses that are not registered in Garoon are considered as remote accesses and the available applications are limited.
      For example, accesses from IP addresses that are listed here are considered as accesses within the office.
      A maximum of 500 IP addresses of IPv4 can be added.
      Only IPv4 addresses can be added. IPv6 is not supported.
      To specify a range of IP addresses, use the CIDR notation. Image of IP address setting
    a): To add multiple IP addresses, click + to increase the input field.
    b): Select the checkbox and click Up or Down to reorder them.

  9. Confirm your settings and click Save.

    Then, set applications for which remote access is allowed.

  10. Click Application users to set applications for which remote access is allowed.

    • If you want to add a target:
    1. On the "Application users" screen, click Add. Image of the add link surrounded by the red rectangle box

    2. On the "Add Target" screen, select the organization, user, or role you want to add, and click Add. Screenshot: The "Add entry" screen with a list of users to add and the "Add" button highlighted

    3. In the "Allow to remote access" field, select the checkboxes of the applications you want to allow remote access.
      Applications that do not have their checkboxes selected in the "Allow to use" field cannot be selected. Image with applications configured to allow remote access

    4. Confirm your settings and click Add.

    • If you want to change the existing target settings:
    1. On the "Application users" screen, click Change for the user you want to change its setting. Image of the change link surrounded by the red rectangle box

    2. On the "Change allowed applications" screen, in the "Allow to remote access" field, select the checkboxes of the applications you want to allow remote access.
      Applications that do not have their checkboxes selected in the "Allow to use" field cannot be selected. Image with applications selected to allow remote access

    3. Confirm your settings and click Save.

  11. On the "Application users" screen, confirm that your settings are displayed in the "Application users" list. Screen showing added targets

    The icons of applications that are not allowed to remote access are displayed as follows:
    Space Example: Space: Remote access prohibited

Managing IP Addresses Using CSV Files

IP addresses to be used to control remote access are managed in a CSV file.

Importing Data from a CSV File

You can import IP addresses to be used to control remote access from the CSV file.
If any error occurs while attempting to import a CSV file, the import will stop, and the imported contents will not be applied.

Steps:
  1. Create a CSV file to import data.

    For information on items that can be managed in CSV files, refer to the "IP Addresses to Be Used to Control Remote Access" section.

  2. Click the Administration menu icon (gear icon) in the header.

    The gear-shaped icon appears only on the screen for the users with administrative privileges.

  3. Click Garoon System Administration.

  4. Select "Basic system administration" tab.

  5. Click Applications.

  6. Click Application users.

  7. On the "Application users" screen, click Details in "Remote access rule". Image of the detail link surrounded by the red rectangle box

  8. On the "Remote access rule details" screen, click Import IP addresses.

  9. On the "Import IP addresses - Step 1/2" screen, select the CSV file that you created in step 1.

  10. Set the data to import, and click Next.

    You can import up to 500 items.
    Options are as follows.

    • Character encoding:
      Encodes data from a CSV file with the selected character code.
      The following character encoding can be selected:
      • UTF-8 (Unicode)
      • Shift-JIS (Japanese)
      • ASCII
      • Latin1 (Western European)
      • GBK/GB2312 (Simplified Chinese)
      • TIS-620 (Thai)
    • Skip the first row:
      If the header row contains information other than data such as an item name and a comment, select "Yes".

  11. On the "Import IP addresses - Step 2/2" screen, check the contents of the CSV file, and click Import.

Exporting Data to a CSV File

You can export IP addresses to be used to control remote access to the CSV file.

Steps:
  1. Click the Administration menu icon (gear icon) in the header.

    The gear-shaped icon appears only on the screen for the users with administrative privileges.

  2. Click Garoon System Administration.

  3. Select "Basic system administration" tab.

  4. Click Applications.

  5. Click Application users.

  6. On the "Application users" screen, click Details in "Remote access rule". Image of the detail link surrounded by the red rectangle box

  7. On the "Remote access rule details" screen, click Export IP addresses.

  8. On the "Export IP addresses" screen, set the required items for the data to be exported.

    The setting fields are as follows:

    • Character encoding:
      Select the character code that you want to use for encoding.
      The following character codes can be selected.
      • UTF-8 (Unicode)
        You can select with BOM as required.
      • Shift-JIS (Japanese)
      • ASCII
      • Latin1 (Western European)
      • GBK/GB2312 (Simplified Chinese)
      • TIS-620 (Thai)
    • Include header row:
      To export an item name to the header row of a CSV file, select "Yes".

  9. Confirm your settings and click Export.

  10. Save the file with a function provided by your Web browser.