Firewall allow lists provides access to specific addresses and programs that would normally be disallowed depending on your security policy. If your security configuration allows all outbound HTTP/HTTPS communication to any IP address or domain, additional changes to allow for JumpCloud traffic shouldn't be necessary. In scenarios where your security policy denies access to most (or all) external IP address or domains, you need to configure an allow list for appropriate functionality with JumpCloud Services.
If your data is stored outside of the US, check which login URL you should be using depending on your region. If your organization uses LDAP, RADIUS, or requires firewall allow list configuration, the Fully Qualified Domain Names (FQDNs) will also be region specific. See JumpCloud Data Centers for the URLs, FQDNs, and IP addresses.
JumpCloud Agent
Required Ports
The JumpCloud Agent service uses SSL/TLS for all communication. If your security policy requires a port number, the standard HTTPS port 443 must be added to an allow list.
The JumpCloud Agent also depends on NTP time services for installation and proper function of the agent. If your security policy requires a port number, port 123 must be added to an allow list. If you are synchronizing with an internal NTP source, access to external traffic on port 123 may not be necessary.
Required Domains
If your company has an allow list of domains, add the domains listed in JumpCloud Agent Networking and Port Requirements to your allow list.
Required IP Addresses
Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud Agent service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.
Our Agent uses mTLS (Mutual Transport Layer Security), which allows it to verify that it is talking to a real JumpCloud server and for JumpCloud to verify that it is talking to a valid enrolled device. Unlike traditional TLS used in the browser, mTLS requires our own private Certificate Authority (CA) to generate a certificate for our Agent to handle provisioning and renewals.
If your firewall is showing warnings about the JumpCloud CA certificate not being signed, or if you want to pin our CA certificates, you can download them using the command below and then upload them to your firewall (our Agent takes care of the device's certificate independently).
curl https://kickstart.jumpcloud.com/GetCACerts > /tmp/agent.jumpcloud.chain.pem
If your firewall is performing HTTPS inspection for all traffic, you will need to add exceptions for traffic going to:
- agent.jumpcloud.com:443
- private-kickstart.jumpcloud.com:443
Without the exceptions, the Agent will flag the different certificates that your firewall generates to be able to decrypt our traffic, and your devices will not be able to connect to JumpCloud.
JumpCloud LDAP-as-a-Service
Required Ports
The JumpCloud LDAP-as-a-Service uses SSL for all communication when utilizing LDAPS, communicating over port 636. If your security policy requires a port number, port 636 must be added to an allow list.
The JumpCloud LDAP-as-a-Service uses StartTLS for supported clients, and otherwise plain-text, for all communications over port 389. If your security policy requires a port number, port 389 must be added to an allow list.
It is suggested that port 389 only be used for clients supporting StartTLS.
Required Domains
If your company has an allow list of domains, please include the following domains to your allow list:
- ldap.jumpcloud.com
Required IP Addresses
Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud LDAP-as-a-Service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.
As an alternative option for additional security, you may inspect your firewall security policy for HTTPS inspection. Refer to JumpCloud LDAPS SSL Certificate for the Certificate Authority, and your firewall vendor documentation for options and support for HTTPS inspection.
JumpCloud RADIUS-as-a-Service
Required Ports
The JumpCloud RADIUS-as-a-Service uses StartTLS for all communication via either EAP-PEAP/MSCHAPv2 or EAP-TTLS/PAP for inner and outer authentication. If your security policy requires a port number, the port 1812 must be added to an allow list.
Required Domains and IP Addresses
For a list of JumpCloud's RADIUS server endpoints and domains depending on your datacenter region, see JumpCloud Data Centers, Login URLs, and Server Endpoints to learn more.
- Beginning February 6, 2025, JumpCloud’s RADIUS service supports AnyCast Routing.
- There are only two IP addresses for each datacenter location used in the configuration.
- AnyCast will automatically route RADIUS requests to the JumpCloud RADIUS server nearest to the device or service endpoint sending the request.
- Configure either IP address as the primary or backup address.
- Many networking devices will only allow for RADIUS server configuration via IP address, so creating an allow list of domains may not be necessary.
JumpCloud Active Directory Integration
Required Ports
The JumpCloud Active Directory Integration uses SSL/TLS for all communication. If your security policy requires a port number, the standard HTTPS port 443 must be added to your allow list.
Required Domains
If your company has an allow list of domains, please include the following domains to your allow list:
- console.jumpcloud.com
Required IP Addresses
Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud Agent service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.
JumpCloud SAML Single Sign-on (SSO)
Required Ports
If your security policy requires a port number, the standard HTTPS port 443 must be added to an allow list.
Required Domains
If your company has an allow list of domains, please include the following domains to your allow list:
- console.jumpcloud.com
JumpCloud Provisioning (SCIM)
Required Ports
If your security policy requires a port number, the standard HTTPS port 443 must be added to an allow list.
Required Domains
If your company has an allow list of domains, please include the following domains to your allow list:
- console.jumpcloud.com
JumpCloud Remote Assist and Background Tools
All JumpCloud customers with JumpCloud Agent version 1.61.0 or later can access Remote Assist for remote desktop access and support. The updated JumpCloud Agent will install JumpCloud Remote Assist agent version 0.2.4 on supported Windows and macOS devices.
To learn more about the complete allow list for Remote Assist and Background Tools, see Understand Remote Assist Agent.