support Posted April 3 Share Posted April 3 There are a few conditions Passwordstate may want to reach out to the internet, all of which can be disabled if desired: Scenario #1: It can contact our clickstudios.com.au website (13.75.255.213), to check an xml file for any new builds available. Configure Location: Administration -> System Settings -> Check for Updates Scenario #2: If you use DUO Authentication to authenticate into Passwordstate, this can reach out to the DUO API which is duosecurity.com Configure Location: Authentication for DUO is found under Administration -> System Settings -> Authentication Options Scenario #3: If you use SAML for authentication, this can reach out to the internet. Examples are using Azure or Google as your SAML provider, and the locations Passwordstate need to reach out to are dependent on which SAML provider you use. Configure Location: Authentication for SAML is found under Administration -> System Settings -> Authentication Options Scenario #4: If you use the HaveIBeenPwned feature in Passwordstate, to check for known bad passwords, Passwordstate can reach out to https://haveibeenpwned.com/ API via the following URL: https://api.pwnedpasswords.com/range/ Configure Location: Administration -> Bad Passwords Scenario #5: If you use Yubico One Time Passwords for authentication, which will need to reach out to yubico.com Configure Location: Authentication for Yubico OTP is found under Administration -> System Settings -> Authentication Options As long as you do not require connection to any of the options above, then you welcome to block access to the internet from your Passwordstate server. Regards, Support Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now