How to setup IP restriction in Kylas?

How to setup IP restriction in Kylas?

This article covers how to set up IP restrictions in kylasSetting up IP restrictions can help enhance the security of your system or application by ensuring that only users or devices from approved IP addresses can access it.

Prerequisites 

Permissions:  Any user with create\Read all permission on Security 

Product Plans: Elevate. (Addon) 

Activities to be Completed: None 


Table of Contents

  1. Introduction

  2. Prerequisites

  3. Step-by-Step Setup Guide

    • Step 1: Accessing Security Settings

    • Step 2: Navigating to Authorized IP Addresses

    • Step 3: Adding IP Addresses

    • Step 4: Setting IP Types (Single, Multiple, Range)

    • Step 5: Assigning IP Restrictions to User Profiles

    • Step 6: Saving & Activating Restrictions

  4. Use Cases

  5. Key Benefits

  6. Conclusion

Introduction

IP Restrictions in Kylas CRM help enhance security by allowing access only from approved IP addresses. This ensures that only trusted networks—like your office or specific branch locations—can log into the system. It's an easy way to prevent unauthorized access and maintain control over how and where your CRM is accessed.


Step 1. Login into your kylas account >> Navigate into setting >> Navigate into Account Setting >> Security. 



Step 2. You will be able to see “Authorized IP Address” tab and two “factor authentication” 

And you will see the “Add Authorized IP Address” CTA. 


Step 3. Click on “Add Authorized IP AddressCTA. Then you will be Add Authorized IP Address according to your requirement. 



Here you can set it up. 

Step 4. Need to Mention IP address Name and you can setup according to the requirement. 

  1. 1. Set Current IP Address  


                             


          1.2. Set Add IP Address with help of this you can add multiple IP Address.


               1.3. Add IP address rang – with help of this you can set an IP Adress rang. 



Step 5. Here you can select Users with the below selected profile(s) can access their accounts only from the set IP address.



Step 6. After setting up the IP Address you can click on Save & Activate CTA, then IP Address works according to set IP Address only. 


Use Cases:

Info
Use Case
Description
Office-Only Access
Restrict CRM access to IPs used in company offices or co-working spaces.
Prevent Unauthorized Remote Access
Block users from logging in outside of allowed IPs such as cafés or homes.
Compliance and Audit Control
Enforce data access policies required by regulatory frameworks.
Multi-Branch Access Control
Allow access only from specific branch locations or regional IPs.
Time-Bound or Event-Based IP Whitelisting
Temporarily whitelist IPs for events, training, or vendor access.
Role-Based Restrictions
Apply different IP rules for different user profiles (e.g., Sales, Admins).
Minimize Data Breach Risks
Prevent external threats by limiting access to known IP addresses.

Benefits:

Idea

Benefit

Details

Enhanced Security

Ensures only users from approved networks can access CRM data.

Reduced Risk of Credential Misuse

Even if credentials are compromised, unauthorized IPs are blocked.

Geo-Fencing Control

Access can be limited to specific geographic locations or regions.

Compliance with IT & Data Security Policies

Helps meet data security standards such as ISO, SOC2, or GDPR.

Custom User Access Management

Assign IP restrictions based on user profiles or teams.

Supports Multiple IP Formats

Add single IPs, multiple IPs, or IP ranges for flexible control.

Quick Setup & Management

Easy-to-use interface to set, manage, and activate restrictions in minutes.

Conclusion:

Setting up IP Restrictions in Kylas CRM adds a critical layer of security by allowing access only from trusted networks. This is especially valuable for organizations that handle sensitive customer data, operate under strict compliance policies, or manage distributed teams.

By leveraging this add-on feature, businesses can:

  • Prevent unauthorized logins,

  • Protect CRM data integrity, and

  • Align access control with their internal IT security practices.

This setup is quick, manageable, and highly effective in safeguarding your CRM environment.



    • Related Articles

    • How to setup two factor authentication in Kylas?

      This article covers how to setup 2 factor authentication in kylas. With help of two factor authentication Protects your account even if your password is compromised by requiring a second verification factor. Prerequisites Permissions: Any user with ...
    • How to setup phone number masking in Kylas?

      Phone number masking is a privacy-focused feature that hides or partially masks contact numbers of leads or customers. It helps protect sensitive data while allowing your team to perform their CRM tasks securely. Kylas CRM supports phone number ...
    • How Forex Works in Kylas CRM

      In today’s global marketplace, businesses often deal with customers, vendors, and partners across different countries and currencies. To support this, Kylas CRM offers a built-in Forex (Foreign Exchange) feature that enables you to manage ...
    • Get Help Using Sherpa – Your Kylas Virtual Assistant

      Sherpa is Kylas' built-in virtual assistant designed to guide you through CRM usage, answer queries, and help you navigate features with ease. Whether you're new to Kylas or looking for quick assistance, Sherpa is your go-to companion—right inside ...
    • How Reporting Managers Can Nudge a Goal in Kylas CRM

      In sales management, setting goals is just the beginning—the real challenge lies in ensuring they are achieved. In Kylas CRM, reporting managers have the powerful capability to “nudge” assigned goals. Nudging acts as a soft reminder or encouragement ...