Iconik Shield Settings Iconik Shield Settings

Iconik Shield Settings

Iconik Shield is an Iconik Enterprise feature that provides advanced security and compliance controls for your account. Learn more about Iconik Shield here.

The Iconik Shield settings page is found under System Settings > Iconik Shield in the Admin interface.

To enable Iconik Shield, toggle Enable Iconik Shield to On. Once enabled, three settings tabs become available:

Permission Settings

The Permission Settings tab controls IP-based access restrictions. You can restrict access to Iconik by adding allowed IP addresses (xxx.xxx.xxx.xxx) or CIDR notation (xxx.xxx.xxx.xxx/24) to each application or to all applications. Make sure to include your own IP address first when configuring.

For full details on configuring IP allowlisting, see IP Allow List.

Log Streaming

The Log Streaming tab allows you to configure destinations for your User Audit Logs. Logs can be streamed to Google Cloud Pub/Sub or Amazon Web Services SQS to be consumed by a SIEM system of your choice. You can add multiple stream recipients.

For full details on configuring log streaming, see Audit Log Streaming.

Email Allow List

The Email Allow List tab controls which email addresses and domains can authenticate to access shared content via Magic Links. Toggle Enable email allow list to On, then add approved email addresses or domains. Only recipients from allowlisted addresses will be able to authenticate via magic links on shares.

For full details on Magic Links and how recipients use them, see Email Allow List.

 

Learn more