{"id":74888,"date":"2023-04-12T15:27:38","date_gmt":"2023-04-12T19:27:38","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=74888"},"modified":"2024-07-02T15:28:03","modified_gmt":"2024-07-02T19:28:03","slug":"create-an-allow-list-for-jumpcloud-services","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/create-an-allow-list-for-jumpcloud-services","title":{"rendered":"Create an Allow List for JumpCloud Services"},"content":{"rendered":"\n

Firewall allow lists provides access to specific addresses and programs that would normally be disallowed depending on your security policy. If your security configuration allows all outbound HTTP\/HTTPS communication to any IP address or domain, additional changes to allow for JumpCloud traffic shouldn’t be necessary. In scenarios where your security policy denies access to most (or all) external IP address or domains, you need to configure an allow list for appropriate functionality with JumpCloud Services.<\/p>\n\n\n\n

JumpCloud Agent<\/h2>\n\n\n\n

Required Ports<\/h3>\n\n\n\n

The JumpCloud Agent service uses SSL\/TLS for all communication. If your security policy requires a port number, the standard HTTPS port 443<\/strong> must be added to an allow list.<\/p>\n\n\n\n

The JumpCloud Agent also depends on NTP time services for installation and proper function of the agent.  If your security policy requires a port number, port 123<\/strong> must be added to an allow list. If you are synchronizing with an internal NTP source, access to external traffic on port 123 may not be necessary.<\/p>\n\n\n\n

Required Domains<\/h3>\n\n\n\n

If your company has an allow list of domains, add the domains listed in JumpCloud Agent Networking and Port Requirements<\/a> to your allow list.<\/p>\n\n\n\n

Required IP Addresses<\/h3>\n\n\n\n

Due to the elastic nature of the JumpCloud infrastructure, we currently do not publish lists of IP addresses for allow lists related to our JumpCloud Agent service at this time. Our servers are load-balanced, as well as regionally dispersed, which can lead to a wide variety of source IPs at any given time.<\/p>\n\n\n\n

Our Agent uses mTLS (Mutual Transport Layer Security), which allows it to verify that it is talking to a real JumpCloud server and for JumpCloud to verify that it is talking to a valid enrolled device. Unlike traditional TLS used in the browser, mTLS requires our own private Certificate Authority (CA) to generate a certificate for our Agent to handle provisioning and renewals.<\/p>\n\n\n\n

If your firewall is showing warnings about the JumpCloud CA certificate not being signed, or if you want to pin our CA certificates, you can download them using the command below and then upload them to your firewall (our Agent takes care of the device’s certificate independently).<\/p>\n\n\n\n

\n

curl https:\/\/kickstart.jumpcloud.com\/GetCACerts > \/tmp\/agent.jumpcloud.chain.pem<\/p>\n<\/div><\/div>\n\n\n\n

If your firewall is performing HTTPS inspection for all traffic, you will need to add exceptions for traffic going to:<\/p>\n\n\n\n