Current doc didn't insist on users picking an authentic method and sticking to it. If an IP is denied but a username and pwd are defined on the environment, this overrides the deny of the IP and the environment remains accessible through the use of the username/pwd combination. Needed to clarify that point.
What's changed
Added a warning and slight rewording here and there.
Why
Current doc didn't insist on users picking an authentic method and sticking to it. If an IP is denied but a username and pwd are defined on the environment, this overrides the
deny
of the IP and the environment remains accessible through the use of the username/pwd combination. Needed to clarify that point.What's changed
Added a warning and slight rewording here and there.