Replace IP Whitelist
POST
/web/v1/users/self/security/ip-whitelistJWTReplaces the entire IP whitelist for the authenticated user's security configuration.
Authentication
Auth Chain: WEB Chain — requires
Authorization: Bearer <jwt>These headers are injected by the system (frontend does nothing):X-PORTAL-ACCESS-CODE(Nginx),X-Request-Id(Gateway)
Request Parameters
| Name | Type | Required | In | Description |
|---|---|---|---|---|
request | Object | Yes | body | IpWhitelistUpdateRequest object (see request body schema) |
Success Response
Success200
{
"version": "1.3.0",
"timestamp": 1709337600000,
"success": true,
"code": "2000",
"message": "SUCCESS",
"data": {
"entries": [
"192.168.1.0/24",
"10.0.0.1"
],
"updatedAt": 1709337600000
}
}Error Responses
Unauthorized401
{
"success": false,
"code": "4010",
"message": "Invalid or expired token"
}Notes
- Replaces the entire whitelist atomically.
- Uses secure channel for encrypted communication.