Filr Admin User is not very secure. The Filr integrated admin user is only protected with a password, has no password policy but can access all internal data from the internet. Adding an option that admin login is restricted to internal or other secure Networks would easy enhance Filr security.

Comments

  • For all accounts that have Admin rights, do the same network restrictions algorithm that we can do today for the saadmin account.

    Appliance Administration UI (port 9443) Access Restrictions
    Allowed Networks (leave blank to allow access from ALL networks):
    (separated by spaces ie. 192.168.1.0/24 192.168.2.10 10.10.10.0/16)

  • The Filr 2.0 and 3.0 only works for Administrative Access for Port :9443 . But "normal" admin Login on Port 8443 or 443 is not limitited at all, but can access all files or even change the filr at all.

  • Noticed this as well.
    I don't like it at all that Administration Console can be accessed from the internet (since it is on Port 443).

    It would be best, if the Administration Console can be restricted to certain (internal) IP ranges and wouldn't be visible for all other IP ranges.
    Alternative option would be have a separate port (eg. 8443) or even a separate network interface for Administration Console and Appliance Administration UI.

    Also there should be a log entry when an admin logs into the Administration Console and maybe, you should even log which changes the admin made to the configuration.

  • Valid request - noted.

  • we need restriction not only for the appliance administration but for the Filr administration itself