If you have a need to connect a SaaS Connector, Workflow, or Event Trigger to an application behind your company’s firewall, then you need to know what IP addresses to allow in your firewall rules so that IdentityNow can communicate with your internal applications. SailPoint now offers a solution to identify the list of IP addresses you need to allow in your firewall to make those external connections safe for your company. Check out this latest guide by @philip-ellis on how you can implement an allow list in your firewall specifically for the IP address range that SailPoint operates on.
Hi @colin_mckibben ,
It would be great if you could also specify that “allow tenant region country.” must be added.
I configured a new Identity Security Cloud Governance SaaS connector. After adding all the public IPs of the tenant region, the authentication still shows bad credentials. However, when I add the tenant country in allow country list, it works
Best regard,
I’m not familiar with this setting. Where did you set it?
I created a pull request. Let me know what you think, or if there is anything you would change about this.
@tyler_mairose
My customer security team has the following questions :
- Why do these IP addresses change ?
- Is it possible to lock or fix this range of IPs ?
- Could you please provide us with an estimated frequency of these changes?
The issue is that if we configure these IP addresses in our network definition, we will need to manually or programmatically monitor for changes.
Could you please provide more details on this matter ?