Skip to content

Commit

Permalink
update docs for token IP allowlists
Browse files Browse the repository at this point in the history
  • Loading branch information
staceysalamon-aiven committed Dec 19, 2024
1 parent 1ae0570 commit 159c54d
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 6 deletions.
4 changes: 2 additions & 2 deletions docs/platform/concepts/authentication-tokens.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,13 +7,13 @@ There are 3 types of tokens used to access the Aiven platform: session tokens, p
Session tokens are created when you log in or make an API call. These tokens are revoked
when you log out of the Aiven Console or the CLI.

You can [create personal tokens](/docs/platform/howto/create_authentication_token) to access resources instead of using your password.
You can [create personal tokens](/docs/platform/howto/create_authentication_token) to
access resources instead of using your password.
Application tokens are linked to
[application users](/docs/platform/concepts/application-users). Application users and
tokens are a more secure option for non-human users like external applications. You can
create multiple personal or application tokens for different use cases.


## Token limits

The maximum number of personal tokens that you can create is 10. Personal tokens are
Expand Down
10 changes: 6 additions & 4 deletions docs/platform/howto/set-authentication-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -74,10 +74,12 @@ the user can create a token.

### Access from allowed IP addresses

You can restrict users to accessing the Aiven Platform from specific IP address ranges
to ensure they are coming from trusted networks. This helps you minimize exposure, reduce
the risk of breaches, and comply with policies and regulations. This also applies to
access through personal and application tokens.
You can restrict access to your organization's resources by allowing only specific IP
address ranges, ensuring connections are coming from trusted networks. This helps you
minimize exposure, reduce the risk of breaches, and comply with policies and regulations.

This authentication policy setting also applies to access through
personal and application tokens.

## Set an authentication policy

Expand Down

0 comments on commit 159c54d

Please sign in to comment.