IP Address Restrictions for Application API Key #5571
TheCyberDesk
started this conversation in
Feature Requests
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Feature Request: IP Address Restrictions for Application API Keys
Problem Statement
Currently, application API keys have full access to the Panel API without any IP-based restrictions. This creates a security concern, especially for admin-level API tokens that have broad permissions across the entire panel.
If an API key is compromised (leaked in logs, exposed in a compromised system, etc.), there's no way to limit from where that key can be used. An attacker could use the token from anywhere in the world.
Proposed Solution
Add the ability to configure allowed IP addresses or CIDR ranges for each application API key. This would work similarly to how many services (AWS, Cloudflare, etc.) allow IP restrictions on API tokens.
Implementation Ideas
When creating or editing an application API key, add a field for "Allowed IP Addresses" where administrators can specify:
203.0.113.5)203.0.113.0/24)The Panel would then validate incoming API requests and reject any that don't originate from the configured IP ranges with a
403 Forbiddenresponse.Use Cases
Benefits
Additional Considerations
Would love to hear thoughts from the maintainers and community on this. Happy to provide additional context or use cases if helpful.
Beta Was this translation helpful? Give feedback.
All reactions