This feature would be excellent for our company for Privileged Access Management.
E.g. Application users are only able to access from our compute clusters, while operational users who need troubleshooting access from on premise can only access from those IP ranges.
This would allow us to prevent users from abusing application credentials and vice versa
This feature would be excellent for our company for Privileged Access Management.
E.g. Application users are only able to access from our compute clusters, while operational users who need troubleshooting access from on premise can only access from those IP ranges.
This would allow us to prevent users from abusing application credentials and vice versa