End User Manual

Follow

Been Invited

Each team member must be invited to use this platform. This can be done in two ways. Either team members can be invited by email, or if the organization is using an Identity Provider, team members may log in via the client after downloading the application.

 

Login

To log in, you will need to provide your organization’s workspace, followed by your Perimeter 81 credentials or your organization’s Identity Provider.
If you’re not sure what your workspace is, you can find the URL here

If your organisation is using two-factor-authenticator, you will be sent a SMS or prompted for the Google Authenticatior code 

mceclip0.png

 

Just type your workspace name on the 'workspace url' field and the login screen will open:

mceclip1.png

After logging in you will see the main interface for Perimeter 81 application.

IF your organisation is using Google Authenticator, please check these instructions

 

mceclip0.png
If you see N/A instead of the server name, please follow this instructions  

 

 

Changing Server

Clicking on the "Change" button, will allow you to change the server you would like to connect:

mceclip2.png mceclip3.png

Navigating between the tabs you will be able to chose from your private or public servers, according to the definition of your administrator. 

Checking your IP

While your are connected, you will see the i button on the top right of the screen:

mceclip9.png

clicking on it will show your IP

mceclip10.png

Settings

Settings can be found in the client applications by clicking on the right corner Menu bar.

mceclip4.png

The Menu settings include Protocol type, Start options, Auto Wi-Fi and the Kill Switch option.

 

mceclip5.png

 

mceclip6.png

 

mceclip7.png

 

mceclip8.png

 

 
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.