What are the system requirements for installing the portal?
- Operating System: Windows 10, 11, 2019, 2022, 2025
- Database: Uses the same database as GLOBODOX
- Hardware: Minimum 16GB RAM, recommended 32GB+ for optimal performance
Who installs the Portal?
Your IT team can install the portal using the provided setup guide, or GLOBODOX support can assist with installation.
Can the portal be installed on a cloud server instead of on-premise?
Yes, you can install the Portal on a cloud-based Windows Server (e.g., AWS, Azure, Google Cloud) .
Can I access the GLOBODOX Portal over the internet?
Yes, there are two ways to enable remote access:
- Option 1: GLOBODOX Cloud Gateway (Recommended)
- Requires no additional setup on your server or network.
- Users can access the portal from anywhere with an internet connection.
- Available as an optional paid add-on.
- Option 2: Manual Network Configuration
- Requires a static public IP for the server hosting the portal.
- Network administrator must configure port forwarding on the router/firewall.
- The portal must be secured with an SSL certificate to ensure encrypted connections.
- Option 1: GLOBODOX Cloud Gateway (Recommended)
What is the easiest way to access the Portal remotely?
The easiest way is using GLOBODOX Cloud Gateway, which requires no additional setup. It works seamlessly without needing a static IP, firewall changes, or VPN setup.
What configurations are required to manually enable internet access?
To make the portal accessible over the internet manually, your IT team must:
✔ Obtain a static public IP address from your internet service provider (ISP).
✔ Configure port forwarding on your router to allow external access to the server hosting the Portal.
✔ Secure the portal with an SSL certificate for encrypted communication.
✔ (Optional) Use a custom domain name instead of an IP address for easier access.
Which method is more secure?
✔ GLOBODOX Cloud Gateway provides secure, hassle-free access without exposing your internal network.
✔ Manual setup requires proper firewall rules and SSL encryption to ensure security.

Add, disable, or modify user access.