Skip to main content

SecureAuth cloud services

The SecureAuth® Identity Platform, end user browsers, and registered mobile devices connect with the SecureAuth cloud services to provide multi-factor authentication capabilities

Allowed URLs and IP addresses

This topic contains the allowed URLs and IP addresses you'll need when configuring the Identity Platform, servers, and devices.

Refer to the section appropriate for your product release for the list of allowed URLs and IP addresses.

You can also download the complete list of URLs and IP addresses: sa-idp-allowlist.json

The domain name system (DNS) resolution for the geo load balanced URLs returns one of the listed IP addresses, depending on the geographic location of the DNS resolver (client). To support SecureAuth cloud services site failover, allow all IP addresses for the URL in the firewall rules.

The domain name system (DNS) resolution for the Geo load balanced URLs returns one of the listed IP addresses. This depends on the geographic location of the DNS resolver (client). To support SecureAuth cloud services site failover, you'll need to allow all IP addresses for the URL in the firewall rules.

us-certs.secureauth.com / nge-cloud.secureauth.com

Purpose: Used for SHA-2 RSA (384) certificate services

IP Addresses:

75.2.72.232
99.83.164.204

us-services.secureauth.com

Purpose: Used for cloud services in the System Info tab:

  • Telephony URL – Telephony Service  (text-to-speech) to deliver one-time passcodes by voice call to user's phone number.

  • SMS URL – SMS Service to deliver one-time passcodes by SMS / text message to user's mobile phone number.

  • Push URL – Push Service to deliver one-time one-time passcodes in any of the following ways:

    • Push Notification to user's mobile device

    • Deliver mobile login requests (Accept / Deny) via SecureAuth Authenticate App to user's mobile device 

  • Link-to-Accept URL – Link-to-Accept to deliver SMS text messages to user's mobile device. The link in emails and SMS text messages point to SecureAuth cloud.

  • Phone Fraud Service URL – Phone Number Fraud Prevention Service to retrieve user's phone number profile to use in phone number blocking.

  • Geo-Location URL – Geo-location Service to retrieve IP address geo-location (known as Dynamic Perimeter) information to use in Adaptive Authentication analysis.

  • SecureAuth Threat Service – SecureAuth Threat Service to retrieve IP address reputation / threat score to use in Adaptive Authentication analysis.

Alternatively, you can view the IP addresses listed in the Amazon EC2 service table. Take note that it lists all AWS IP addresses, and you only want to allow the IPs within EC2, us-east-1, and us-west-2 categories: ip-ranges.amazonaws.com/ip-ranges.json

us-audit.secureauth.com

Purpose: Used by SecureAuth servers to receive customer logs for dashboard services and user risk services.

IP Addresses:

us-trx.secureauth.com

Purpose: Used to deliver transaction operation communications to the SecureAuth cloud environment:

  • Trx Log Service URL – Transaction log service to deliver transaction operation communications to the SecureAuth cloud environment.

  • Trx Log Mode Code – Transaction log mode code automatically assigned to the instance during the build process to indicate whether the logging mode is transaction  or user based.

  • Trx Log Disable Code – Transaction Log disable code provided by SecureAuth Support to temporarily disable transaction web service calls.

IP Addresses:

75.2.50.208
99.83.150.226

us-polaris.secureauth.com

Purpose: Used for New Experience Web Admin interface assets

IP Addresses:

15.197.205.255
3.33.245.231

sparkles-content.prod.secureauth.com

Purpose: New Experience Web Admin user interface assets and storage configuration.

IP Addresses:

To view the page of listed IP addresses, see CloudFront IP list

your-tenant-name.secureauth.com

Purpose: IDP services main endpoint (Cloudflare-protected tenant endpoints).

IPv4 Addresses:

173.245.48.0/20
103.21.244.0/22
103.22.200.0/22
103.31.4.0/22
141.101.64.0/18
108.162.192.0/18
190.93.240.0/20
188.114.96.0/20
197.234.240.0/22
198.41.128.0/17
162.158.0.0/15
104.16.0.0/13
104.24.0.0/14
172.64.0.0/13
131.0.72.0/22

IPv6 Addresses:

2400:cb00::/32
2606:4700::/32
2803:f800::/32
2405:b500::/32
2405:8100::/32
2a06:98c0::/29
2c0f:f248::/32

For the latest Cloudflare IP ranges, refer to:

Example of SecureAuth cloud services settings for 19.07 and later
secureauth_cloud_services_001_2104.png

Important

Important information about MSG level encryption 

The msg level encryption endpoints are deprecated (no longer appending /msg after .svc in the URL). Going forward, use https in the URL configuration.

The domain name system (DNS) resolution for the Geo load balanced URLs returns one of the listed IP addresses. This depends on the geographic location of the DNS resolver (client). To support SecureAuth cloud services site failover, you'll need to allow all IP addresses for the URL in the firewall rules.

us-certs.secureauth.com / nge-cloud.secureauth.com

Purpose: Used for SHA-2 RSA (384) certificate services

IP Addresses:

75.2.72.232
99.83.164.204

us-cloud.secureauth.com

Purpose: Used for cloud services for SecureAuth IdP 9.3 or earlier:

  • Telephony URL – Telephony Service  (text-to-speech) to deliver one-time passcodes by voice call to user's phone number.

  • SMS URL – SMS Service to deliver one-time passcodes by SMS / text message to user's mobile phone number.

  • Push URL – Push Service to deliver one-time one-time passcodes in any of the following ways:

    • Push Notification to user's mobile device

    • Deliver mobile login requests (Accept / Deny) via SecureAuth Authenticate App to user's mobile device 

  • Link-to-Accept URL – Link-to-Accept to deliver SMS text messages to user's mobile device. The link in emails and SMS text messages point to SecureAuth cloud.

  • Phone Fraud Service URL – Phone Number Fraud Prevention Service to retrieve user's phone number profile to use in phone number blocking.

  • Geo-Location URL – Geo-location Service to retrieve IP address geo-location (known as Dynamic Perimeter) information to use in Adaptive Authentication analysis.

  • SecureAuth Threat Service – SecureAuth Threat Service to retrieve IP address reputation / threat score to use in Adaptive Authentication analysis.

IP Addresses:

75.2.72.232
99.83.164.204

us-trx.secureauth.com

Purpose: Used to deliver transaction operation communications to the SecureAuth cloud environment:

  • Trx Log Service URL – Transaction log service to deliver transaction operation communications to the SecureAuth cloud environment.

  • Trx Log Mode Code – Transaction log mode code automatically assigned to the instance during the build process to indicate whether the logging mode is transaction  or user based.

  • Trx Log Disable Code – Transaction Log disable code provided by SecureAuth Support to temporarily disable transaction web service calls.

IP Addresses:

75.2.50.208
99.83.150.226
Example of SecureAuth cloud services settings for 9.3 and earlier
secureauth_cloud_services_002_9_3.png

Important

Important information about MSG level encryption 

The msg level encryption endpoints are deprecated (no longer appending /msg after .svc in the URL). Going forward, use https in the URL configuration.

Test the Identity Platform endpoint availability

To verify that these endpoints are available from the Identity Platform instance, browse (from the instance) to the following URLs:

Instrafructure details

SecureAuth cloud services are hosted in two geographically separated, SSAE16 Type II certified data centers: US-East and US-West. Both facilities provide redundant infrastructure at the site and service levels, including power, cooling, network, and internet connectivity, to ensure high availability.

An industry-leading, cloud-based geo-location load balancing solution routes Identity Platform and SecureAuth cloud access communications to the most efficient facility. In the event of a site-level outage, all communications are seamlessly transferred to the backup facility.

Each SecureAuth data center includes:

  • Load-balanced web service APIs for SMS, TTS, Push, Push-to-Accept OTP, Threat Intelligence, and X.509 certificate signing services

  • Redundant hardware security module (HSM) protected certificate authorities

  • Clustered (failover) database services

  • Redundant backend services (LDAP Directory, DNS, Firewall, IDS/IDP, content inspection, etc.)

All communications between the Identity Platform, SecureAuth cloud access, and SecureAuth cloud services are secured via TLS/HTTPS over TCP Port 443

60560908.png

Transport Layer Security

Transport Layer Security (TLS), a cryptographic protocol, is designed to provide communications security over a network. Using X.509 certificates, asymmetric cryptography is employed to verify the relationship between a certificate and its owner, and to negotiate a symmetric session key.

SecureAuth cloud services

The Identity Platform instance and cloud access portals communicate with SecureAuth cloud for the following services:

Service

Purpose

X.509 Certificate Services (SHA 1 and SHA 2)

Issue user certificates.

Telephony Service (text-to-speech)

Deliver OTPs via voice call to user's phone number.

SMS Service

Deliver one-time passcodes (OTPs) via SMS / text message to user's mobile phone number.

Push Service

Deliver OTPs via Push Notification to user's mobile device and / or deliver mobile login requests (Approve / Deny) via SecureAuth Authenticate App to user's mobile device.

Link-to-Accept

Deliver SMS text messages to user's mobile device. The link in emails and SMS text messages point to SecureAuth cloud.

Phone Number Fraud Prevention Service

Retrieve user's phone number profile to use in phone number blocking.

Geo-location Service

Retrieve IP address geo-location (known as Dynamic Perimeter) information to use in Adaptive Authentication analysis.

SecureAuth Threat Service

Retrieve IP address reputation / threat score to use in Adaptive Authentication analysis.

App Enrollment Service

Generate QR code to use in Multi-Factor App Enrollment (SecureAuth Authenticate App).

SecureAuth Authenticate App v5.3+

URLs supported for push notifications and device enrollment QR codes

A complete callback URL is included in the API payload for device enrollment QR codes and Push-to-Accept Notifications. When responding to either a QR code device enrollment request or Push-to-Accept request, the SecureAuth Authenticate App returns the URL with a DNS prefix such as us1-.

Example callback URL:

"https://us1-cloud.secureauth.com/mobileservice/api/v1/pushaccept"