No description
Find a file
Nextcloud bot 2235af6272
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-10-22 01:07:43 +00:00
.github chore(ci): update workflows 2025-09-28 18:10:18 +02:00
.tx [tx-robot] Update transifex configuration 2022-10-01 02:43:08 +00:00
appinfo chore: apply Rector rules 2025-02-03 11:19:19 +01:00
css docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
js docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
l10n fix(l10n): Update translations from Transifex 2025-10-22 01:07:43 +00:00
lib chore: replace deprecated IConfig->getAppValue 2025-02-03 11:19:19 +01:00
LICENSES ci(reuse): Add reuse check 2024-12-17 16:24:32 +01:00
screenshots docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
templates chore: apply Rector rules 2025-02-03 11:19:19 +01:00
tests chore(tests): Do not clear hooks 2025-05-20 11:01:30 +02:00
vendor-bin bump(deps): composer upgrade 2025-05-20 10:50:55 +02:00
.gitignore docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
.nextcloudignore docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
.php-cs-fixer.dist.php chore: upgrade deps and supported Nextcloud version 2025-01-31 15:13:09 +01:00
AUTHORS.md docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
CHANGELOG.md docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
composer.json chore: add rector with Nextcloud rules 2025-02-03 11:19:19 +01:00
composer.lock bump(deps): composer upgrade 2025-05-20 10:50:55 +02:00
COPYING Add proper AGPL-v3 license 2023-08-21 11:11:24 +02:00
krankerl.toml docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
Makefile docs(reuse): Add SPDX header 2024-12-17 16:23:51 +01:00
psalm.xml chore: upgrade deps and supported Nextcloud version 2025-01-31 15:13:09 +01:00
README.md docs(readme): Add reuse status badge 2024-12-17 16:29:35 +01:00
rector.php chore: apply Rector rules 2025-02-03 11:19:19 +01:00
REUSE.toml chore: add rector with Nextcloud rules 2025-02-03 11:19:19 +01:00

Limit login to IP ranges

REUSE status

This app modifies the login logic to only allow logins from specified ip address ranges.

The allowed IP addresses have to be passed via occ app:config as a string separated by comma.

For example:

To allow 127.0.0.0/24:

  • occ config:app:set limit_login_to_ip whitelisted.ranges --value 127.0.0.0/24

To allow 127.0.0.0/24 and 192.168.0.0/24:

  • occ config:app:set limit_login_to_ip whitelisted.ranges --value 127.0.0.0/24,192.168.0.0/24

To allow 127.0.0.0/24 and also 192.168.0.0/24 as well as 2001:db8::/32:

  • occ config:app:set limit_login_to_ip whitelisted.ranges --value 127.0.0.0/24,192.168.0.0/24,2001:db8::/32

Alternatively, you can use admin settings to restrict logins to specific ip address ranges.