<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security rule based on Virtual proxy used in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359070#M10249</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I set a security rule based on Virtual proxy the user used at login? We'd like to open logging to public internet, for example for mobile users etc. If we allow login from public internet it will come thru a specific virtual proxy. But we would like to give access to restricted content that way, so we'll put that to another stream. Rest of content (the more sensitive content) will be accessible by logging in thru another virtual proxy. Or is it so that once user gets in, he/she sees everything they see, no matter how they log in?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Aug 2017 07:37:09 GMT</pubDate>
    <dc:creator />
    <dc:date>2017-08-07T07:37:09Z</dc:date>
    <item>
      <title>Security rule based on Virtual proxy used</title>
      <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359070#M10249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I set a security rule based on Virtual proxy the user used at login? We'd like to open logging to public internet, for example for mobile users etc. If we allow login from public internet it will come thru a specific virtual proxy. But we would like to give access to restricted content that way, so we'll put that to another stream. Rest of content (the more sensitive content) will be accessible by logging in thru another virtual proxy. Or is it so that once user gets in, he/she sees everything they see, no matter how they log in?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Aug 2017 07:37:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359070#M10249</guid>
      <dc:creator />
      <dc:date>2017-08-07T07:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security rule based on Virtual proxy used</title>
      <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359071#M10250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;One solution is to enable the extended environment (from proxy configuration). This allow you to track the client IP address (expect the outer request come through a different network class). You should write a security rule using it (user.environment.ip) to restrict the access to certain content for those coming from outside&lt;/SPAN&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 19:21:05 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359071#M10250</guid>
      <dc:creator>Vincenzo_Esposito</dc:creator>
      <dc:date>2017-08-09T19:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Security rule based on Virtual proxy used</title>
      <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359072#M10251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Vincenzo! So to use the user.environment.ip in the security rule, I just need to assign some wildcard to evaluate if the traffic is from inside, right? I mean I won't know every single IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Aug 2017 07:23:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359072#M10251</guid>
      <dc:creator />
      <dc:date>2017-08-10T07:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security rule based on Virtual proxy used</title>
      <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359073#M10252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Yes you should use wild character (*) and like instead the equal sign.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Aug 2017 11:54:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359073#M10252</guid>
      <dc:creator>Vincenzo_Esposito</dc:creator>
      <dc:date>2017-08-10T11:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: Security rule based on Virtual proxy used</title>
      <link>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359074#M10253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A href="https://community.qlik.com/people/ves"&gt;ves&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Aug 2017 11:56:49 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Security-rule-based-on-Virtual-proxy-used/m-p/1359074#M10253</guid>
      <dc:creator />
      <dc:date>2017-08-10T11:56:49Z</dc:date>
    </item>
  </channel>
</rss>

