Skip to main content

IP Allowlist

Restrict management API access to specific IP ranges. Requires Enterprise plan. The evaluation API is not restricted to ensure SDK connectivity from customer applications.

Auth: JWT (Owner or Admin role)


Get IP Allowlist

GET /v1/ip-allowlist

Response 200 OK

{
"enabled": true,
"cidr_ranges": [
"10.0.0.0/8",
"192.168.1.0/24",
"203.0.113.42/32"
]
}

If no allowlist has been configured, returns enabled: false with an empty cidr_ranges array.


Update IP Allowlist

PUT /v1/ip-allowlist

Request

{
"enabled": true,
"cidr_ranges": [
"10.0.0.0/8",
"192.168.1.0/24"
]
}
FieldTypeRequiredDescription
enabledbooleanYesWhether the allowlist is active
cidr_rangesstring[]YesList of CIDR ranges (IPv4 or IPv6)

Response 200 OK

{
"message": "IP allowlist updated"
}

Validation

  • Each entry must be a valid CIDR range (e.g., 10.0.0.0/8, 2001:db8::/32)
  • Invalid CIDR notation returns 422 Unprocessable Entity
danger

Enabling the allowlist with ranges that exclude your current IP will lock you out of the management API. Always include your current IP range before enabling.