Authentication by IP Ranges
Overview
This integration allows automatic authentication for specific users based on their originating IP address. Our platform validates the user's IP against configured allowed IPs or ranges, enabling seamless access without manual login.
Admin Role Limitation – click to expand
Authentication methods based on IP, URL referrer, LTI, or SAML are designed for end-user access only.
When the identifier corresponds to an administrator account, the platform intentionally starts the session with regular user permissions to prevent privilege escalation.
Administrators who need to access the Control Panel must:
- Set a password to their account.
- Log out of the current integration-based session.
- Log back in using email + password to regain full administrator privileges.
Customers can provide individual IPs or IP ranges from which their users will access the store. This feature supports two modes:
- Direct: Users access from a controlled physical location (e.g., university network).
- Proxy: Users access remotely through a configured proxy (e.g., EZProxy).
Pre-requisites
The following requirements must be met to use this feature:
- You must be an Enterprise plan subscriber.
How It Works
When a user accesses the store from a configured IP address or range, the system checks this address against the allowed list. If a match is found, the user is authenticated automatically without needing to log in manually.
The system supports both direct IP authentication and proxy-based authentication, allowing access from non-direct locations via known proxy IPs.
Our authentication service:
- Validates IPs against configured ranges (per user or entry point)
- Authenticates users automatically
- Stores session metadata to track the automatic login source
- Records activity logs with the matched IP and range
- Can automatically create new user accounts when needed
Configuration Methods
There are two ways to assign IP authentication:
- User-Based Assignment: Assign IPs or ranges directly to a user. Note that with this method, all users accessing from the configured IP ranges will be authenticated as the same user account, meaning reading statistics cannot be individualized. For individual user statistics, use the Entry Point-Based Assignment method instead.
- Entry Point-Based Assignment: Assign IPs or ranges to an Entry Point and authenticate users using email headers