Create an Allow List for JumpCloud Services

Firewall allow lists provides access to specific addresses and programs that would normally be disallowed depending on your security policy. If your security configuration allows all outbound HTTP/HTTPS communication to any IP address or domain, additional changes to allow for JumpCloud traffic shouldn't be necessary. In scenarios where your security policy denies access to most (or all) external IP address or domains, you need to configure an allow list for appropriate functionality with JumpCloud Services.

JumpCloud Agent

Required Ports

The JumpCloud Agent service uses SSL/TLS for all communication. If your security policy requires a port number, the standard HTTPS port 443 must be added to an allow list.

The JumpCloud Agent also depends on NTP time services for installation and proper function of the agent.  If your security policy requires a port number, port 123 must be added to an allow list. If you are synchronizing with an internal NTP source, access to external traffic on port 123 may not be necessary.

Required Domains

If your company has an allow list of domains, add the domains listed in JumpCloud Agent Networking and Port Requirements to your allow list.

Required IP Addresses

Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud Agent service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.

As an alternative option for additional security, you may inspect your firewall security policy for HTTPS inspection. You can download the JumpCloud Agent domain certificate authorities via the openssl command; provided as an example is the method for pulling the agent.jumpcloud.com CA (with the resulting file as /tmp/jumpcloud.chain.pem):

echo -n | openssl s_client -connect agent.jumpcloud.com:443 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.chain.pem

JumpCloud LDAP-as-a-Service

Required Ports

The JumpCloud LDAP-as-a-Service uses SSL for all communication when utilizing LDAPS, communicating over port 636. If your security policy requires a port number, port 636 must be added to an allow list.

The JumpCloud LDAP-as-a-Service uses StartTLS for supported clients, and otherwise plain-text, for all communications over port 389. If your security policy requires a port number, port 389 must be added to an allow list.  

Note:

 It is suggested that port 389 only be used for clients supporting StartTLS.

Required Domains

If your company has an allow list of domains, please include the following domains to your allow list:

  • ldap.jumpcloud.com

Required IP Addresses

Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud LDAP-as-a-Service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.

As an alternative option for additional security, you may inspect your firewall security policy for HTTPS inspection. Refer to JumpCloud LDAPS SSL Certificate for the Certificate Authority, and your firewall vendor documentation for options and support for HTTPS inspection.

JumpCloud RADIUS-as-a-Service

Required Ports

The JumpCloud RADIUS-as-a-Service uses StartTLS for all communication via either EAP-PEAP/MSCHAPv2 or EAP-TTLS/PAP for inner and outer authentication. If your security policy requires a port number, the port 1812 must be added to an allow list.

Required Domains

If your company has an allow list of domains, include the following domains to your allow list:

  • US East – us1.radius.jumpcloud.com
  • US West – us2.radius.jumpcloud.com
  • EU – eu1.radius.jumpcloud.com
  • APAC – ap1.radius.jumpcloud.com

Note:

Many networking devices will only allow for RADIUS server configuration via IP address, so creating an allow list of domains may not be necessary.

Required IP Addresses

If your company has an allow list of IP addresses, please include the following IP addresses to your allow list. While the JumpCloud infrastructure is elastic by nature, RADIUS clients generally do not support for domain addressing, so IP addresses are provided:

  • US East – 18.204.0.31
  • US West – 54.203.27.225
  • EU – 18.194.159.20
  • APAC – 18.182.131.248

As an alternative option for additional security, you may inspect your firewall security policy for HTTPS inspection. Refer to JumpCloud RADIUS Certificate for the Certificate Authority, and your firewall vendor documentation for options and support for HTTPS inspection.

JumpCloud Active Directory Integration

Required Ports

The JumpCloud Active Directory Integration uses SSL/TLS for all communication. If your security policy requires a port number, the standard HTTPS port 443 must be added to your allow list.

Required Domains

If your company has an allow list of domains, please include the following domains to your allow list:

  • console.jumpcloud.com

Required IP Addresses

Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud Agent service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.

As an alternative option for additional security, you may inspect your firewall security policy for HTTPS inspection. You can download the JumpCloud Agent domain certificate authorities via the openssl command; provided as an example is the method for pulling the console.jumpcloud.com CA (with the resulting file as /tmp/jumpcloud.chain.pem):

echo -n | openssl s_client -connect console.jumpcloud.com:443 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.chain.pem

List IconIn this Article

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case