IP Restrictions allow practices using Enterprise Security to control where users can access Practice by Numbers from. By restricting access to approved IP addresses, practices can prevent logins from unauthorized locations while still allowing controlled remote access when needed.
Where to Find IP Restrictions
Go to: New Settings > General > Security Management > IP Allowlist
What Is an IP Allowlist?
An IP allowlist is a list of approved IP addresses that users are allowed to log in from.
When IP restrictions are enforced:
Users can only access PbN from approved IP addresses
Login attempts from unknown IPs are blocked
Users may submit an access request if allowed by the practice
Adding Approved IP Addresses
Administrators can:
Add individual IP addresses
Label IPs (e.g., Office Network, Remote Provider)
Quickly add their current IP address to avoid lockout
⚠️ Important: Always add your current IP address before enabling IP restrictions to prevent losing access.
Enabling IP Restrictions
IP restrictions are enforced from:
Security Management > General Settings
Once enabled, restrictions can be applied to:
Specific roles
Specific users
User Experience: IP Access Requests
If a user attempts to log in from an unapproved IP:
They will see a message stating their IP requires approval
They can submit an IP Access Request for the practice(s) they need
Each request shows a clear status:
Approved – Access granted
Pending – Awaiting admin review
Rejected – Denied; user may request again
Not Requested – No request submitted
Admin Experience: Reviewing Requests
From the IP Access Requests tab, admins can:
View pending requests
See the requesting user and IP address
Approve or deny access with one click
This workflow keeps security tight while minimizing disruption.
Best Practices
Use IP restrictions for office-only access
Pair IP allowlisting with Time Windows for stronger control
Review pending IP requests regularly
Summary
IP Restrictions help practices ensure that only trusted locations can access PbN. With request-based approvals and full admin visibility, Enterprise Security balances strong protection with operational flexibility.





