Access to Web Application

Created by Russell Harland, Modified on Sun, 23 Jun at 10:39 AM by Russell Harland

If you have received an email invitation to use the web application but you cannot complete the process and the below response or similar is present then the issue is potentially with the IT Network policies with your company.



Some companies have a network restriction policy that does not allow new web based application be utilised within their network.


Your IT Department will need to enable the web application to be used within your network along as your user credentials (email address, not your password). This is a term used called "Whitelisting".


Whitelisting users to access a closed network system means creating a list of approved users who are granted permission to access the system, while all other users are denied access. This security measure ensures that only authorized individuals can enter the network, reducing the risk of unauthorized access and potential security breaches. The whitelist typically contains the unique identifiers of the approved users, such as IP addresses, MAC addresses, usernames, or digital certificates.

Key aspects of whitelisting include:

  1. Restricted Access: Only users on the whitelist can access the network or system. This creates a controlled environment where access is tightly regulated.
  2. Enhanced Security: By limiting access to a predefined set of users, whitelisting helps protect against unauthorized access, cyberattacks, and data breaches.
  3. Authentication: Users on the whitelist may still need to authenticate themselves through additional security measures like passwords, two-factor authentication, or biometric verification.
  4. Management: The whitelist needs to be regularly updated to add new authorized users and remove those who should no longer have access.

In summary, whitelisting is a security strategy used to ensure that only trusted and verified users can access a closed network system, enhancing overall security and reducing potential vulnerabilities.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article