Skip to main content

Device Lock – Network URL Whitelisting Requirements

Updated this week

Introduction

This document lists the domain URLs that must be whitelisted in the customer network to allow Oloid products to function correctly.

Whitelisting these URLs ensures proper connectivity for the Oloid platform, authentication services, APIs, and supporting infrastructure.

Allow outbound HTTPS traffic (Port 443) to the domains listed below.


Product

Field

Value

Product Name

Device Lock

Applicable Products

Device Lock

Protocol

HTTPS

Port

443

Direction

Outbound


URL Whitelisting

Admin API & Platform Portal

Service

PROD

UAT

DEV

Admin API & Platform Portal

oloid.cloud

oloidpreview.com

oloiddev.com

<tenantname>.oloid.cloud

<tenantname>.oloidpreview.com

<tenantname>.oloiddev.com

api.oloid.cloud

api.oloidpreview.com

api.oloiddev.com

oloid.info


Face Authentication

(Required if Face authentication is enabled)

Service

PROD

UAT

DEV

Face Authentication

fr.oloid.cloud

fr.oloidpreview.com

fr.oloiddev.com


User API & User Portal

(Required if using Workday or User Portal services)

Service

PROD

UAT

DEV

User API & Portal

api.myoloid.com

api.previewoloid.net

api.previewoloid.com

<tenantname>.myoloid.com

<tenantname>.previewoloid.net

<tenantname>.previewoloid.com

api.myoloid.co

api.myoloid.net

api.myoloid.net


Passwordless Authentication

Service

PROD

UAT

DEV

Passwordless Authentication

<tenantname>.oloidsso.com

<tenantname>.oloidsso.net

<tenantname>.oloidsso.com


Google Firebase Services


Notes

  • Replace <tenantname> with your organization's Oloid tenant name.

  • If face authentication is not used, the Face Authentication URLs are optional.

  • Some deployments may only require PROD environment URLs depending on the environment being used.


Keywords

| Device Lock Whitelisting URLs | Oloid network Whitelisting | Device Lock Connectivity | Oloid Firebase Services Whitelist |

Did this answer your question?