CloudCodes is a cloud security solution provider founded in 2011. We focus on providing cloud security solutions to enterprise customers through its single sign-on solution. Our objective is to provide a simple, effective, and efficient platform for securing cloud applications for an enterprise. CloudCodes offers integrated solutions and efficient control over your data. We are also recognized by Analyst firm Gartner as one of the sample vendors for Cloud Security and SaaS Security. 


How to Login in the CloudCodes?


Step1-: Go to the URL <domain name>.ssoone.com. login with your admin credentials in this page.


Step 2-: After login into the account, you will get the Admin page of CloudCodes. From where you can manage your users and policies. Click on the Manage Organisation.


Step 3-: Now drop down the policies tab that present in the left side of the page. Click on the Access control > Web. It will open the policies page from where you can set the policies.

Step 4-: Click on Add policy to add or create a new policy for your users.

Here we have 5 types of policies. All those policies are listed below:


1. Browser Restriction-:


This feature includes the restriction of end-users from accessing confidential files and folders on any web browser. Access Control in cloud computing ensures users can access business data from browsers specified through policy by the IT admin of an enterprise. Click Here to know more.


How to create a browser restriction policy-:

 

Step 1-: Enter the name, description, and required field in the page.


Just click on the Enable button and select the browser which you want to restrict for the users. Enter the browser version in the text box field. Select the OU for users or select a particular user to enable the policy and click on the save button.

By enabling this policy, your user will not be able to open their account in that restricted browser.

2. IP restriction-:


IP based access control in cloud computing, let's you to enforce of IP restriction policy that enables IT admin, to restrict user access to business data only through one or more specified IP address(es) only. This ensures that no business data is accessed in an unsecured, public, or unregistered IP address. Click Here to know more.


How to create a browser restriction policy-:


Step 1-: Go to the policy page, as I have already mentioned in my previous steps.


Step 2-: Click on the IP restriction policy and click on the Enable and Add policy button.


Step 3-: After clicking on the Enable button, you will get a pop-up on your screen. Enter the IP address in this field. (You can enter one IP address or IP range in this field)


Step 4-: After adding the IP address, you can see your mentioned IP in the below picture. Select the OU of the user and click on the Save button to save this policy.


3. Time Restrictions-:

 

Time-based access control in cloud computing lets you restrict users from accessing corporate data at odd times or out of office timings. Ensure business data is accessed during specified workdays and time only. Click Here to know more.


How to create a Time restriction policy-:


Step 1-: Go to the Time restriction policy in policy section.

 

Step 2-: Select the Time restriction policy -> Click on the Enable option to enable the policy ->Enter the Time Zone (According to your location) -> Select the days and click on the Save button to enable this policy.


Note-: In the Time restriction policy, you will get an option to Force logout for your users. This feature will work only if the pop-up option is enabled from the browser.


4. Device Restriction-:

 

Access Control in cloud security, restrict users from accessing corporate data from unknown, public, or unauthorized devices. This ensures no business data is copied, transferred, virus-infected, or so to and from a personal or public device. Click Here to know more.


How to enable Device restriction policy-:


Step 1-: Go to the Device policy in the policy section.


Step 2-: Click on the Enable option and Enable Mac binding option as shown in the picture.


Step 3-: Select the users from your list and click on the Save button.

Note-: This feature will work only if you have installed the Agent in your system.


5. Geo-Fencing-:

 

Create virtual work boundaries for your users to prevent unauthorized data access from unidentified locations with the Geo-location restriction / Geo Gencing feature of CloudCodes Access Control in a cloud security solution. Click Here to know more.


How to enable the Geo location policy-:


Step 1-: Go to the Geo location in policy section.


Step 2-: Click on the Enable option and select the country. In my case, I have selected India.



By Enabling this policy, your user will not be able to use their account outside the selected country.