Whitelist

A whitelist is a list of items that are granted access to a certain system or protocol. When a whitelist is used, all entities are denied access, except those included in the whitelist. The opposite of a whitelist is a blacklist, which allows access from all items, except those included the list.

The following are examples of different whitelist applications:

  • A network administrator may configure a firewall with a whitelist that only allows specific IP addresses to access the network.
  • A protected directory within a website may use a whitelist to limit access to certain IP addresses.
  • Some e-mail systems can be configured to only accept messages from e-mail addresses that have added to a user's whitelist.
  • Programmers can use whitelists within programs to ensure only certain objects are modified.

Whitelists are a good option when only a limited number of entities need to be granted access. Because all items not included in a whitelist are denied access, whitelists are considered more secure than blacklists. However, if only a few entities need to be denied access, a blacklist is more practical.

Updated September 29, 2010 by Per C.

quizTest Your Knowledge

Martech refers to what type of technology?

A
Marine
0%
B
Marketing
0%
C
Metaverse
0%
D
Metadata
0%
Correct! Incorrect!     View the Martech definition.
More Quizzes →

The Tech Terms Computer Dictionary

The definition of Whitelist on this page is an original definition written by the TechTerms.com team. If you would like to reference this page or cite this definition, please use the green citation links above.

The goal of TechTerms.com is to explain computer terminology in a way that is easy to understand. We strive for simplicity and accuracy with every definition we publish. If you have feedback about this definition or would like to suggest a new technical term, please contact us.

Sign up for the free TechTerms Newsletter

How often would you like to receive an email?

You can unsubscribe or change your frequency setting at any time using the links available in each email.

Questions? Please contact us.