US English (US)
GB English (UK)

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create ticket
English (US)
US English (US)
GB English (UK)
  • Home

Restrict access to Logon page from the internet.

Learn how to secure your logon page by restricting access from the internet to enhance the security of your online accounts.

Written by Neil Langston

Updated at May 22nd, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Getting Started
  • FAQs
  • API Documentation
  • Integrations
  • Migration Agent
  • Directory Synchronisation
  • Remote DC agent
  • Remote Password Sync Agent
  • Install and Configure
  • Support
  • Complex Expressions
+ More

Table of Contents

How does PowerSyncPro Migration Agent communicate with the PowerSyncPro server? What website address does PowerSyncPro server typically use? What is undesirable? How can this be circumvented?

How does PowerSyncPro Migration Agent communicate with the PowerSyncPro server?

For the vast majority of our customers and partners, PowerSyncPro is presented to the internet for Migration Agent over HTTPS onto their own hosted PowerSyncPro server. This is so that PowerSyncPro Migration Agent installed on your workstations can perform the following actions uninterrupted from any internet connection, at work or at home:

  • Create a secure connection and register the workstation in your instance of PowerSyncPro
  • Hourly interrogate if it the machine is part of a batch and therefore a runbook, for a migration.
  • Report progress and logging back to the PowerSyncPro server

 

PowerSyncPro recommends you make your server internet accessible with your own Public SSL (https) so that when the device state changes (for example from AD joined to WORKGROUP to Entra Joined) your workstation will maintain access to PowerSyncPro server (for the items above) regardless of any of your configuration items or settings being removed or added during the state change which might impact connectivity.

 

What website address does PowerSyncPro server typically use?

For typical implementations when RDP'ing onto the server, you will be using the following address to access the PowerSyncPro server configuration:

http://localhost:5000

For Migration Agent, you will have an internet accessible endpoint, this is one of the parameters you specify in Migration Agent msi install:

https://pspma.mycompanydomain.com/agent

The other parameter is your server PreSharedKey (PSK).

 

What is undesirable?

Having this address accessible on the internet will also make it possible to log into the configuration GUI for PowerSyncPro.

 This might be undesirable for the configuration console to be accessible externally.

For example, you will be able to goto any configuration page over the internet, if you have the credentials.

https://pspma.mycompanydomain.com/sync/syncProfiles

 

How can this be circumvented?

PowerSyncPro Migration Agent only needs access to the following path of the URL to perform all the actions described at the beginning of this article.

/agent

So in our pretend example this would be

https://pspma.mycompanydomain.com/agent

 

Using re-write rules in IIS, we can restrict access to only the /agent URL, so that other parts of the configuration are blocked by IIS.

 

Firstly, the prerequisites for using re-write rules is to have the following three features installed on the server (these are detailed in the prerequisites on the downloads page PowerSyncPro - Downloads and Documentation )

  • IIS
  • Microsoft URL Rewrite
  • Microsoft Application Request Routing 3.0 (x64)

 

Download this script onto the PowerSyncPro server from our Github page, and load an administrative powershell

PSP-Replace-WebConfig.ps1

This requires two parameters

  • Domain: Your PSP external endpoint domain (e.g. psp.contoso.com). It must not include slashes or 'http'.
  • LocalEndPoint: PSP local endpoint. Defaults to 'localhost:5000'. It must not include slashes or 'http'.

For our fictitious example it would be

.\PSP-Replace-WebConfig.ps1 -Domain pspma.mycompanydomain.com -LocalEndpoint localhost:5000

When you run this, it will backup and standardise your web.config for PSP only, it expects the file to be in the standard location of:

C:\inetpub\wwwroot\web.config

Here is an example

 

Now test you cannot get to this site or the logon page of the PowerSyncPro configuration:

https://pspma.mycompanydomain.com/sync/syncProfiles

 

You will now have to manage PowerSyncPro configuration when RDP'ing onto the server using:

http://localhost:5000

 

To manually configure re-write rules, please review the documentation on PowerSyncPro - Downloads and Documentation

 

 

 

limit access login page

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Known Issues and Limitations
  • Office Applications or Outlook failing to log in after migration
  • Attempting to generate a Bulk Enrolment Token returns blank browser window

Subscribe to Newsletter

Drop your email in the box below to sign up. We promise to keep our updates relevant and useful – and we’ll never share your details.

PowerSyncPro is the ultimate product for easing the pain and frustration during mergers, acquisitions, divestitures, and consolidations.

Terms & Conditions

  • FAQs
  • Privacy Policy
  • Cookies
  • Anti Slavery Notice

PowerSyncPro

  • Case Studies
  • Contact sales
  • Meet the Team
  • EULA

Get Connected

Room 73, Wrest House, Wrest Park, Silsoe, Bedford, England, MK45 4HR
info@powersyncpro.com

Twitter Youtube Linkedin

Knowledge Base Software powered by Helpjuice

Expand