LogoLogo
codatum.comSign InStart for free
  • Introduction
  • Getting Started
    • Quick Start
    • Concept (Further reading)
      • Why did we a choose Block Editor over Cell-based Editor?
  • Connect and Manage Data
    • Connection
      • Sync Table Metadata
    • Supported Warehouses
      • BigQuery
      • Snowflake
      • Other Warehouses
    • Catalog
    • Search
  • Data Exploration
    • Data Exploration Overview
    • Notebook
      • Doc Page
      • Grid Page
      • SQL Block
      • Version
      • Notebook FAQ
    • Chart
    • Explorer
    • Parameter
    • (Appendix) Cache
  • AI Assist
    • SQL Assistant
  • Sharing
    • Sharing Overview
    • Teamspace
    • Shared Notebook
    • Report
    • Public Link
    • Signed Embed
      • How to Set Up Signed Embed
  • Account Management
    • Account
    • Account Settings
  • Workspace & User Management
    • Workspace
  • User Management
    • Invitation
    • Group
  • Security
    • Security Overview
  • Audit logs
  • IP Access Control
  • Access control
    • Access Control Overview
    • Access Control for Workspace
    • Access Control for Resources
      • Access Control for Group
      • Access Control for Teamspace
      • Access Control for Notebook
      • Access Control for Connection
      • Access Control for Report
  • [Under Construction] Plan and Billing
    • Limit and usage
    • Downgrade and cancel
  • Best Practices
    • Advanced Control Structures in SQL
  • Other considerations
    • System requirements
Powered by GitBook

Reference

  • Privacy policy
  • Terms of service
  • JP Docs Site
On this page

Was this helpful?

  1. Security

Security Overview

Manage security settings and monitor access to your Workspace resources.

PreviousGroupNextAudit logs

Last updated 2 months ago

Was this helpful?

The Security section provides tools to enhance your Workspace security and track who is accessing resources and from where.

  • Audit logs: View detailed records of user actions and system events within your Workspace.

  • IP Access Control: Restrict Workspace access to specific IP addresses or ranges.

  • : View all published public links, including who created them and when they were shared.

Public Links Monitoring

Workspace Owners can view a complete list of all public links that have been created to share resources from the Workspace. The list includes information about:

  • Which resource was shared

  • Who created the public link

  • When the link was created

  • Expiration date (if set)

This visibility helps maintain security by ensuring all shared content is authorized and appropriate.

Public Links Monitoring