LogoLogo
codatum.comSign InStart for free
  • Introduction
  • Getting Started
    • Quick Start
    • Concept (Further reading)
      • Why did we a choose Block Editor over Cell-based Editor?
  • Connect and Manage Data
    • Connection
      • Sync Table Metadata
    • Supported Warehouses
      • BigQuery
      • Snowflake
      • Redshift
      • Other Warehouses
    • Catalog
    • Quick Search
  • Data Exploration
    • Data Exploration Overview
    • Notebook
      • Doc Page
      • Grid Page
      • SQL Block
      • Version
      • Notebook FAQ
    • Chart
    • Explorer
    • Parameter
      • Parameter Types
      • Escape and Dynamic Reference
      • Dynamic Select Options
    • (Appendix) Cache
  • AI Assist
    • AI Analyst
  • Sharing
    • Sharing Overview
    • Teamspace
    • Sharing per notebook
    • Report
    • Public Link
    • Signed Embed
      • How to Set Up Signed Embed
  • Account Management
    • Account
    • Account Settings
  • Workspace & User Management
    • Workspace
    • User Management
      • Invitation
      • Group
  • Security
    • Security Overview
    • Audit logs
    • IP Access Control
  • Access control
    • Access Control Overview
    • Access Control for Workspace
    • Access Control for Resources
      • Access Control for Group
      • Access Control for Teamspace
      • Access Control for Notebook
      • Access Control for Connection
      • Access Control for Report
  • [Under Construction] Plan and Billing
    • Limit and usage
    • Downgrade and cancel
  • Best Practices
    • Advanced Control Structures in SQL
  • Other considerations
    • System requirements
Powered by GitBook

Reference

  • Privacy policy
  • Terms of service
  • JP Docs Site
On this page

Was this helpful?

  1. Security

Security Overview

Manage security settings and monitor access to your Workspace resources.

The Security section provides tools to enhance your Workspace security and track who is accessing resources and from where.

  • Audit logs: View detailed records of user actions and system events within your Workspace.

  • IP Access Control: Restrict Workspace access to specific IP addresses or ranges.

  • Public Links Monitoring: View all published public links, including who created them and when they were shared.

Public Links Monitoring

Workspace Owners can view a complete list of all public links that have been created to share resources from the Workspace. The list includes information about:

  • Which resource was shared

  • Who created the public link

  • When the link was created

  • Expiration date (if set)

This visibility helps maintain security by ensuring all shared content is authorized and appropriate.

PreviousGroupNextAudit logs

Last updated 9 days ago

Was this helpful?