In most cases you will not need to make a firewall hole to support requests to and responses from Apidapter. Protocols like LTI, Apidapter Authenticated Messaging, and POST/GET requests do not require this sort of access.
However, there are some instances where a firewall hole may need to be made. One example of this is when an on-site directory server (e.g. LDAP) is used for an authentication look-up within an adapter. If this is the case you can check with us for the IP address of your adapter.
Fortunately, this is one of the advantages to using Apidapter as the authentication gateway of choice. While you may still need to make a single firewall hole for Apidapter, you can consolidate and close all of the other firewall holes you made for other third party vendors by using an end-point handler that integrates with these third party systems without the need for directly fetching credentials form your campus, such as LTI or the Apidapter Authenticated Messaging protocol.
Do I need to make a firewall hole?
Have more questions? Submit a request
Please sign in to leave a comment.
0 Comments