Tuhund ERP Blog
Irfan Mustafa Qazi
Irfan Mustafa Qazi
14/07/2025 06:42 AM

Why Location Access May Be Required for Login in Tuhund and How It Keeps You Secure

If you're seeing a message like:

"Login denied: Location permission not granted in your browser."

it means your login attempt was blocked because location access is required — based on your company’s security policy configured in Tuhund.

In this post, we’ll explain why this happens, how it works, and what other security mechanisms are working alongside it to protect your organization.


Why Location-Based Login?

Tuhund supports location verification at login as an optional feature that your system administrator can enable or disable based on your organization's security policies. This feature is managed through security groups, and may apply only to specific departments, users, or employee types.

When enabled, users must allow location access in their browser or phone to successfully log in.


Does Tuhund Record My Location?

Yes — but only if you are an employee.

  • For employees: Tuhund does record and store exact location data at login and for each and every task that you perform in Tuhund, including simply browsing. This data helps organizations maintain audit trails, enforce compliance, and secure sensitive activities.

  • For external users (customers, vendors, etc.): Tuhund does not store location information. It is used momentarily to authorize the session and then discarded.


What If I'm Not Comfortable Sharing My Location?

If you're an employee and are concerned about location tracking:

  • This is a company-level policy, not something controlled by Tuhund.

  • Please raise the concern with your HR team or management.

  • Tuhund merely provides the tools; how they are configured is entirely up to your organization.


Other Security Features in Tuhund

Location-based login is just one part of Tuhund’s multi-layered security framework. Other advanced features may also be enabled based on your company’s policy, including:

  • IP Whitelisting: Allowing access only from authorized networks or offices.

  • Two-Factor Authentication (2FA): Requiring a second factor like an OTP or authenticator app at login.

  • System-Based Locking: Restricting access to pre-registered devices or systems.

These features help companies enforce fine-grained control over who can access what — and from where.


AI-Powered Monitoring

Tuhund uses AI to monitor user activity and behavioral trends continuously. This includes:

  • Pattern recognition across login times, devices, and locations

  • Detection of unusual behavior or access anomalies

  • Automated alerting and escalation of potential security threats

This helps organizations detect risks early — often before human users even notice them.


How to Enable Location Access

On Desktop

Chrome:

  1. Click the 🔒 padlock icon next to the URL.

  2. Go to "Permissions" > Location, and choose Allow.

  3. Refresh and log in again.

Firefox / Edge / Safari:

  • Go to site settings and allow location access for the page.

On Mobile

Android (Chrome):

  • Settings → Apps → Chrome → Permissions → Location → Allow only while using the app

iOS (Safari/Chrome):

  • Settings → [Browser Name] → Location → While Using the App


❓ Frequently Asked Questions

Q: Can I log in without allowing location access?
A: Only if your security group does not require it. If location is required, access is denied until permission is granted.

Q: Is my location tracked every time I use Tuhund?
A: Only at login, and only if you are an employee. External users’ location data is not stored.

Q: Can I use a VPN?
A: VPNs may affect location detection. Disable it if login fails due to location errors.

Q: Who sets these policies?
A: All security settings — including location-based login — are configured by your system administrator based on your company’s policy, not by Tuhund.


Conclusion

Tuhund is designed with enterprise-grade security at its core. Features like location-based login, IP restrictions, device locking, and two-factor authentication work together to protect your data and your operations.

Combined with AI-driven activity monitoring, Tuhund helps your organization stay one step ahead of security risks — without adding friction to the user experience.

If you have concerns about any of these policies, we recommend reaching out to your HR or IT administrator. Tuhund provides the capabilities, but how they are used is entirely up to your organization.

For help enabling location access or resolving login issues, please refer to the steps above or contact support.

Labels :

security

,

access rights

,

enterprise

,

location

,

authentication

,

administrator

,

organization

,

multi-layered

,

authenticator

,

verification

,

login

,

protection

,

secure

,

access

,

access control

,

policy


Tuhund Logo
TUHUND®
Home About us Modules CRM HR SALES BI SERVICES MANAGEMENT INVENTORY MANAGEMENT ACCOUNTING AND FINANCE PROCUREMENT PROJECT MANAGEMENT ERP ADMINISTRATION DATA REPOSITORY API & SUB PORTALS Careers Community Blog
M Home Schedule Demo About us Community Blog
CRM HR SALES BI SERVICES MANAGEMENT INVENTORY MANAGEMENT ACCOUNTING AND FINANCE PROCUREMENT PROJECT MANAGEMENT ERP ADMINISTRATION DATA REPOSITORY API & SUB PORTALS Careers
API Documents
Request Demo