Access and login¶

Purpose: Explain how operators access IPCom5 Control and sign in using the supported deployment methods.
1. Access methods¶
Web accessis available for all deployment variants through browser URL/domain and management port.Windows .exe accessis available in Windows installations and opens the same IPCom Control environment through the Windows client path.
2. Web access flow¶
- Open the IPCom Control URL in a browser (
http(s)://<host>:<port>). - Confirm the target instance/build on the login page before entering credentials.
- Sign in with your user account.
- After login, verify environment and health on
Status.
3. Windows .exe access flow¶
- Start the IPCom Control
.exefrom the Windows installation. - Select or enter the target receiver instance (host/domain and port).
- Authenticate with your IPCom account credentials.
- Verify you are on the intended instance using
Statusheader/footer context.
4. Security baseline for access¶
- Use HTTPS for management access whenever possible.
- Restrict management UI reachability to trusted networks (VPN/allowlist/firewall policy).
- Keep
administratorfor break-glass use and use named accounts for daily operations. - Rotate credentials and integration secrets regularly.
5. Quick troubleshooting¶
Cannot login: verify correct host/port, account credentials, and account status inUsers.Wrong instance opened: confirm header instance label andStatusfooter host/user context.Session expires too quickly: review token settings and role policy inUsers.Unexpected build/version: stop changes and confirm deployment target before proceeding.
6. Related pages¶
- Account operations: Users tab
- First post-login verification: Status tab