{"version":1,"pages":[{"id":"5aFgncIrDA3gOysvXoem","title":"Getting Started","pathname":"/","siteSpaceId":"sitesp_zY0r5","emoji":"1f680","description":"The Getting Started section introduces GoodAccess as a product and takes you through the necessary steps to get started."},{"id":"fi04p4gmp16p3igTnhEd","title":"1. What is GoodAccess?","pathname":"/getting-started/1.-what-is-goodaccess","siteSpaceId":"sitesp_zY0r5","description":"Discover what GoodAccess is, how it works, and what makes it unique. Learn about its features, benefits, and why it's a top choice for secure remote access.","breadcrumbs":[{"label":"Getting Started","emoji":"1f680"}]},{"id":"UaYz97bWLCisON83YAzf","title":"2. Architecture Overview","pathname":"/getting-started/2.-architecture-overview","siteSpaceId":"sitesp_zY0r5","description":"The architecture overview outlines the GoodAccess product, its operation, and related entities.","breadcrumbs":[{"label":"Getting Started","emoji":"1f680"}]},{"id":"SI7xsUAVHigpQYtSTqFg","title":"3. Sign up for Free Trial","pathname":"/getting-started/3.-sign-up-for-free-trial","siteSpaceId":"sitesp_zY0r5","description":"Sign up for a 14-day Free Trial and all the features of GoodAccess.","breadcrumbs":[{"label":"Getting Started","emoji":"1f680"}]},{"id":"ICYOJKtc5t9JcLYlO2zZ","title":"4. Download App & Connect","pathname":"/getting-started/4.-download-app-and-connect","siteSpaceId":"sitesp_zY0r5","description":"Now let's download the GoodAccess Client Application (the Agent) and test the connection to your dedicated GoodAccess Gateway.","breadcrumbs":[{"label":"Getting Started","emoji":"1f680"}]},{"id":"V9XjvJ2S200kPhqlHLLN","title":"Features","pathname":"/configuration-guides/features","siteSpaceId":"sitesp_zY0r5","description":"These configuration guides will teach you how to set up each Feature and get the maximum security out of GoodAccess.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"}]},{"id":"Z59Es37TZdBLRP86yKoH","title":"Zero Trust Access Control","pathname":"/configuration-guides/features/zero-trust-access-control","siteSpaceId":"sitesp_zY0r5","description":"Take control of your network security with Zero Trust Access Control.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"K8U8ZwRNHRkOTLOz1Xcb","title":"Access Cards","pathname":"/configuration-guides/features/zero-trust-access-control/access-cards","siteSpaceId":"sitesp_zY0r5","description":"Increase your organization's security with Access Cards. Define who can access your Systems and Clouds & Branches and when. Enforce granular, time-based restrictions to ensure secure, tailored access.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"Zero Trust Access Control"}]},{"id":"BzhkpPi6ZhAFTSdROQqw","title":"Device Posture Check","pathname":"/configuration-guides/features/zero-trust-access-control/device-posture-check","siteSpaceId":"sitesp_zY0r5","description":"Secure your network perimeter effectively with Device Posture Check, which assesses device security based on customizable policy restrictions in real-time.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"Zero Trust Access Control"}]},{"id":"j5TIvejpb7cZKG4hcwJc","title":"Device Approval","pathname":"/configuration-guides/features/zero-trust-access-control/device-approval","siteSpaceId":"sitesp_zY0r5","description":"Enhance security by controling which devices gain access to your secure perimeter.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"Zero Trust Access Control"}]},{"id":"18gDAkWLaG22xQTwpcOE","title":"Geo Restrictions","pathname":"/configuration-guides/features/zero-trust-access-control/geo-restrictions","siteSpaceId":"sitesp_zY0r5","description":"Strengthen protection by allowing or denying connections from specific countries.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"Zero Trust Access Control"}]},{"id":"CNyPPTOc3bBP2m0ZsTYa","title":"API Integration","pathname":"/configuration-guides/features/api-integration","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to obtain an API token within the GoodAccess Control Panel for accessing the API and performing authorized operations.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"GKzgJ14ogNjeCl1PW2qa","title":"API Reference","pathname":"/configuration-guides/features/api-integration/api-reference","siteSpaceId":"sitesp_zY0r5","description":"Dive into the specifics of each API endpoint by checking out our complete documentation.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"}]},{"id":"Z1c59mb4SWwM1QxtrTML","title":"Members","pathname":"/configuration-guides/features/api-integration/api-reference/members","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to perform actions on a specific Member of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"JoSqw0E0U3fdqtYpYkR9","title":"Groups","pathname":"/configuration-guides/features/api-integration/api-reference/groups","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to perform actions on a specific Group of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"6BOJr2jM9iJAK1GxrkNE","title":"Systems","pathname":"/configuration-guides/features/api-integration/api-reference/systems","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to perform actions on a specific System of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"VkYXNu4is5fq7dIqDIOT","title":"System Groups","pathname":"/configuration-guides/features/api-integration/api-reference/system-groups","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to perform actions on a specific System Group of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"UQQO6oAnzD8lKm7S6mJL","title":"Access Cards","pathname":"/configuration-guides/features/api-integration/api-reference/access-cards","siteSpaceId":"sitesp_zY0r5","description":"Create custom Access Cards granting access to selected Systems and assign it to your Team Members.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"Cr8qHgR71XZHI9Nwcu34","title":"Relations","pathname":"/configuration-guides/features/api-integration/api-reference/relations","siteSpaceId":"sitesp_zY0r5","description":"Define relations like Access Cards with Systems or Members, and Groups with Access Cards or Members.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"hBjysHKWNkyEGepVURx8","title":"Gateways","pathname":"/configuration-guides/features/api-integration/api-reference/gateways","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to fetch data about the Gateways of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"8SPUZ9QWIm6h9Lp14O7V","title":"Devices","pathname":"/configuration-guides/features/api-integration/api-reference/devices","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to fetch data about the Devices of your Team Members.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"L7cUyO8nmJrFNAKZJgPw","title":"Tokens","pathname":"/configuration-guides/features/api-integration/api-reference/tokens","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to perform actions on a specific Token of your Integration.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"a1JxtyTQ2ZfRNcEJPgWH","title":"Logs","pathname":"/configuration-guides/features/api-integration/api-reference/logs","siteSpaceId":"sitesp_zY0r5","description":"This endpoint allows you to fetch the logs of your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"},{"label":"API Reference"}]},{"id":"cEH0rKC4vDsqhfNxExej","title":"Acronis Integration","pathname":"/configuration-guides/features/api-integration/acronis-integration","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to set up an integration between GoodAccess and Acronis CyberApp.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"API Integration"}]},{"id":"iXsoxzJG3SJ6gLl0uJP3","title":"SIEM Integration","pathname":"/configuration-guides/features/siem-integration","siteSpaceId":"sitesp_zY0r5","description":"Enhance threat visibility with Security Information and Event Management (SIEM) integration for automated log forwarding, policy-driven analysis, and API-triggered incident mitigation.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"sIQu2h18uOUNmbriVlXM","title":"SSO/SCIM","pathname":"/configuration-guides/features/sso-scim","siteSpaceId":"sitesp_zY0r5","description":"Logging in with a third-party identity provider makes the login process effortless and increases security.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"XJeAbnotvId623Honi3B","title":"Auth0","pathname":"/configuration-guides/features/sso-scim/auth0","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with Auth0 SSO.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"7FcBjZz4uHfFbUiGv85i","title":"Cisco Duo","pathname":"/configuration-guides/features/sso-scim/cisco-duo","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with Cisco Duo SSO.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"A4HJNhGL2bKBtJUhJIyF","title":"Google Workspace","pathname":"/configuration-guides/features/sso-scim/google-workspace","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with Google Workspace SSO/SCIM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"nkwxFDqCBnNr0uDTHZLl","title":"JumpCloud","pathname":"/configuration-guides/features/sso-scim/jumpcloud","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with JumpCloud SSO.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"U6SWkJI2DayOuQHvBq4j","title":"Microsoft Entra ID","pathname":"/configuration-guides/features/sso-scim/microsoft-entra-id","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with Microsoft Entra ID SSO/SCIM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"JwWTzCJAyTflcvhFaXi5","title":"Okta","pathname":"/configuration-guides/features/sso-scim/okta","siteSpaceId":"sitesp_zY0r5","description":"With this guide you will learn how to integrate GoodAccess with Okta SSO/SCIM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"EmH3UMXGaxHQHpqpkLLn","title":"OneLogin","pathname":"/configuration-guides/features/sso-scim/onelogin","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with OneLogin SSO/SCIM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"TDd057tjgMjrZ2POoSD6","title":"Ping Identity","pathname":"/configuration-guides/features/sso-scim/ping-identity","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with Ping Identity SSO/SCIM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"THVEYmR5i2XGntl5GQsR","title":"Universal (SAML)","pathname":"/configuration-guides/features/sso-scim/universal-saml","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to integrate GoodAccess with with any SSO provider supporting SAML.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"},{"label":"SSO/SCIM"}]},{"id":"sCOunC2dFkTcbAXHdia4","title":"MFA","pathname":"/configuration-guides/features/mfa","siteSpaceId":"sitesp_zY0r5","description":"Multi-factor authentication (MFA) is an access control technique that requires a user to provide one or more additional proofs of identity on top of the password and username.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"SzGUhUlFTe1Dtr5UaZ8O","title":"Passkeys","pathname":"/configuration-guides/features/passkeys","siteSpaceId":"sitesp_zY0r5","description":"Secure your account with Passkeys—fast, easy, and phishing-proof WebAuthn authentication for passwordless login using Face ID, Touch ID, or a PIN.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"QyB9wQYpoUOgW0id5ecQ","title":"MSI deployment","pathname":"/configuration-guides/features/msi-deployment","siteSpaceId":"sitesp_zY0r5","description":"Centralize and automate Client App deployment across all devices using MDM tools for efficient and secure enterprise distribution.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"45MKl48tUbjdZ2U6rPrK","title":"Threat Blocker","pathname":"/configuration-guides/features/threat-blocker","siteSpaceId":"sitesp_zY0r5","description":"Protect your Team and company resources by automated detection and blocking of malicious domains.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"JqthvozfYMDX6k1fl2Qa","title":"Custom Domain Blocking","pathname":"/configuration-guides/features/custom-domain-blocking","siteSpaceId":"sitesp_zY0r5","description":"Restrict access to specific domains for your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"VWChy6hsMpBomJ7MZwhY","title":"DNS Management","pathname":"/configuration-guides/features/dns-management","siteSpaceId":"sitesp_zY0r5","description":"Manage custom DNS records for your Team.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"VP8Ah1zghXJ35nbyaXY6","title":"Split Tunneling","pathname":"/configuration-guides/features/split-tunneling","siteSpaceId":"sitesp_zY0r5","description":"Access your critical systems via the secure GoodAccess gateway and route non-essential traffic directly to optimize latency.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"ncBK4eZpFTF97t6DEvi5","title":"Port Forwarding","pathname":"/configuration-guides/features/port-forwarding","siteSpaceId":"sitesp_zY0r5","description":"Forward specific incoming traffic to your Gateway to an internal private IP address of your Team Member.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Features"}]},{"id":"ohBQAifjAGkyw1SiI2cd","title":"Branch Connector","pathname":"/configuration-guides/branch-connector","siteSpaceId":"sitesp_zY0r5","description":"Branch Connector allows you to connect your private on-premise networks to the GoodAccess Gateway to make your private systems accessible using the GoodAccess Client Application.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"}]},{"id":"W4orXafYTIpHCuWrOdwr","title":"Cisco","pathname":"/configuration-guides/branch-connector/cisco","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your Cisco device to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"8fp5TFxC59rrOCZfV2Hb","title":"Cisco Meraki","pathname":"/configuration-guides/branch-connector/cisco-meraki","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your Cisco Meraki device to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"7R8ndfoUUy2A8bqubx86","title":"FortiGate","pathname":"/configuration-guides/branch-connector/fortigate","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your FortiGate device to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"5x1Ph765FnlJRbkwhveb","title":"MikroTik","pathname":"/configuration-guides/branch-connector/mikrotik","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your MikroTik device to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"I695mFDKw2VHXFaBuaD8","title":"SonicWall","pathname":"/configuration-guides/branch-connector/sonicwall","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your SonicWall device to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"kepH97pCB6W8cDcPkyje","title":"UniFi USG","pathname":"/configuration-guides/branch-connector/unifi-usg","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your UniFi device to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"55vZhj8CIy87h6QtjUUQ","title":"Zyxel Nebula Control Center","pathname":"/configuration-guides/branch-connector/zyxel-nebula-control-center","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your branch in Zyxel Nebula Control Center to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"5QXKf1Confa5MF3UC99a","title":"Other supported routers and firewalls","pathname":"/configuration-guides/branch-connector/other-supported-routers-and-firewalls","siteSpaceId":"sitesp_zY0r5","description":"Here you will find a list of other supported routers and firewalls.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Branch Connector"}]},{"id":"WQYrklPu1Hii6YD7PzhE","title":"Cloud Connector","pathname":"/configuration-guides/cloud-connector","siteSpaceId":"sitesp_zY0r5","description":"Cloud Connector allows you to connect your private cloud networks to the GoodAccess Gateway in order to make your private cloud systems and apps accessible using the GoodAccess Client Application.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"}]},{"id":"pXAz8KLFvMEGlwdh7F5H","title":"AWS","pathname":"/configuration-guides/cloud-connector/aws","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your AWS cloud to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Cloud Connector"}]},{"id":"qZeAUzqF4LxM56RLe3EN","title":"Google Cloud","pathname":"/configuration-guides/cloud-connector/google-cloud","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your Google Cloud to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Cloud Connector"}]},{"id":"pKWc7xK70Oa0XKWJCY4d","title":"Microsoft Azure","pathname":"/configuration-guides/cloud-connector/microsoft-azure","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to connect your Microsoft Azure cloud to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Cloud Connector"}]},{"id":"U7Y1g8NmLS2docsE9DZ5","title":"Other Public Cloud providers","pathname":"/configuration-guides/cloud-connector/other-public-cloud-providers","siteSpaceId":"sitesp_zY0r5","description":"Below is a list of other supported public cloud providers.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Cloud Connector"}]},{"id":"Tp003qf3QWxZ573bdUyY","title":"IP whitelisting","pathname":"/configuration-guides/ip-whitelisting","siteSpaceId":"sitesp_zY0r5","description":"IP whitelisting helps you to protect your publicly visible corporate systems like third-party SaaS services (CRMs, cloud tools, etc.) with GoodAccess.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"}]},{"id":"Jc1g7TWQpt5ZLs3TiQA3","title":"APACHE Web Server","pathname":"/configuration-guides/ip-whitelisting/apache-web-server","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in APACHE Web Server.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"mxfwmzHs4LPRyiDPBnaI","title":"AWS VPC","pathname":"/configuration-guides/ip-whitelisting/aws-vpc","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in AWS VPC.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"Ry9J2nRt6I4n61RztXrL","title":"Azure (Office 365)","pathname":"/configuration-guides/ip-whitelisting/azure-office-365","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Azure (Office 365).","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"C7xNSnF0seYkGuyv43d7","title":"Google Cloud","pathname":"/configuration-guides/ip-whitelisting/google-cloud","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Google Cloud.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"BG57kmoryuCyHF7Y7h81","title":"Google Workspace","pathname":"/configuration-guides/ip-whitelisting/google-workspace","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Google Workspace.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"AZk9M4hVOM3GjT46am3i","title":"Magento","pathname":"/configuration-guides/ip-whitelisting/magento","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Magento.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"C6thiCpdEUsTpMgssUEn","title":"Microsoft IIS","pathname":"/configuration-guides/ip-whitelisting/microsoft-iis","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Microsoft IIS.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"7vCT8fH0k781lkJxrb3h","title":"NGINX","pathname":"/configuration-guides/ip-whitelisting/nginx","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in NGINX.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"tRFUOl0nfodIMIR6SKyN","title":"Domain","pathname":"/configuration-guides/ip-whitelisting/nginx/domain","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in NGINX for a domain.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"},{"label":"NGINX"}]},{"id":"HvKp06dK6sWwrIzPw49L","title":"Subdomain","pathname":"/configuration-guides/ip-whitelisting/nginx/subdomain","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in NGINX for a subdomain.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"},{"label":"NGINX"}]},{"id":"J1AbBcxTvDCM5TK0DCTS","title":"URL","pathname":"/configuration-guides/ip-whitelisting/nginx/url","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in NGINX for a URL.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"},{"label":"NGINX"}]},{"id":"SbTFgOK1p5y0dxBoPx7i","title":"OpenCart","pathname":"/configuration-guides/ip-whitelisting/opencart","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in OpenCart.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"2JBzp5CFx5xVuLb6ZfXx","title":"PHP","pathname":"/configuration-guides/ip-whitelisting/php","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in PHP.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"12yDEeLXXQ2oOnHrbzHq","title":"PHPMyAdmin","pathname":"/configuration-guides/ip-whitelisting/phpmyadmin","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in PHPMyAdmin.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"JGhTE16zWi2J8zHvBvtN","title":"Pipedrive","pathname":"/configuration-guides/ip-whitelisting/pipedrive","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Pipedrive.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"rhqBtm9iuArA9Z9XQJ1J","title":"SalesForce","pathname":"/configuration-guides/ip-whitelisting/salesforce","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in SalesForce.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"fq7OwX58pqPqxTu1kBhA","title":"SSH server","pathname":"/configuration-guides/ip-whitelisting/ssh-server","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in SSH server.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"BJx4P4lGRyx5XegsWOQP","title":"WordPress","pathname":"/configuration-guides/ip-whitelisting/wordpress","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in WordPress.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"nXnyqQ9xk9GWU0M7fyJi","title":"Zoho CRM","pathname":"/configuration-guides/ip-whitelisting/zoho-crm","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to whitelist your GoodAccess IP address in Zoho CRM.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"IP whitelisting"}]},{"id":"4o2w3y3T2iPW2kR536Q0","title":"Linux","pathname":"/configuration-guides/linux","siteSpaceId":"sitesp_zY0r5","description":"These configuration guides will teach you how to install the GoodAccess Client Application to various Linux distributions.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"}]},{"id":"DyWhDlYMBrPucHxhSUfd","title":"DEB repository","pathname":"/configuration-guides/linux/deb-repository","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to install the GoodAccess Client Application using the GoodAccess DEB repository.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Linux"}]},{"id":"Xz9MdIwoQ0eFckaEozCa","title":"RPM repository","pathname":"/configuration-guides/linux/rpm-repository","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to install the GoodAccess Client Application using the GoodAccess RPM repository.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Linux"}]},{"id":"D4FMEK541ooJUqfK0Bfv","title":"Manual installation","pathname":"/configuration-guides/linux/manual-installation","siteSpaceId":"sitesp_zY0r5","description":"This guide will show you how to manually install the GoodAccess Client Application using downloaded packages.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Linux"}]},{"id":"JA9qc1lF0ZSwsPVNeCJY","title":"Linux Troubleshooting","pathname":"/configuration-guides/linux/linux-troubleshooting","siteSpaceId":"sitesp_zY0r5","description":"These guidelines will show you how to troubleshoot any issue you may encounter.","breadcrumbs":[{"label":"Configuration guides","emoji":"1f5a5"},{"label":"Linux"}]},{"id":"FzrTOsYapdiTLEGTbvKo","title":"FAQ","pathname":"/faq-and-troubleshooting/faq","siteSpaceId":"sitesp_zY0r5","description":"In this section you will find Frequently Asked Questions and their answers.","breadcrumbs":[{"label":"FAQ & Troubleshooting","emoji":"1f198"}]},{"id":"zq7bi3UXwingcEq2Q7W9","title":"Business","pathname":"/faq-and-troubleshooting/faq/business","siteSpaceId":"sitesp_zY0r5","description":"In this section you will find business-related Frequently Asked Questions and answers.","breadcrumbs":[{"label":"FAQ & Troubleshooting","emoji":"1f198"},{"label":"FAQ"}]},{"id":"AMmXsp91KYN1FQPUJBuA","title":"Technical","pathname":"/faq-and-troubleshooting/faq/technical","siteSpaceId":"sitesp_zY0r5","description":"In this section you will find Frequently Asked Questions and answers related to the technical aspects of GoodAccess.","breadcrumbs":[{"label":"FAQ & Troubleshooting","emoji":"1f198"},{"label":"FAQ"}]},{"id":"DC2p2Sc2mqXp9jr825cf","title":"Troubleshooting","pathname":"/faq-and-troubleshooting/troubleshooting","siteSpaceId":"sitesp_zY0r5","description":"These guidelines will show you how to troubleshoot any issue you may encounter.","breadcrumbs":[{"label":"FAQ & Troubleshooting","emoji":"1f198"}]},{"id":"jhpR3GhJabRzyVjWVpsz","title":"Windows","pathname":"/product-changelog/windows","siteSpaceId":"sitesp_zY0r5","description":"Stay up-to-date with the latest changes and enhancements in our Product Changelog for Windows.","breadcrumbs":[{"label":"Product Changelog","emoji":"1f4d3"}]},{"id":"tAev2uJWD9eMg2gmFkIK","title":"macOS","pathname":"/product-changelog/macos","siteSpaceId":"sitesp_zY0r5","description":"Stay up-to-date with the latest changes and enhancements in our Product Changelog for macOS.","breadcrumbs":[{"label":"Product Changelog","emoji":"1f4d3"}]}]}