VIP Authentication Hub IP address to whitelist at Firewall when connecting with new LDAP server
search cancel

VIP Authentication Hub IP address to whitelist at Firewall when connecting with new LDAP server

book

Article ID: 376918

calendar_today

Updated On:

Products

VIP Authentication Hub

Issue/Introduction

Customer need to point to a new LDAP IP address and for firewall request which IP needs to open to backend LDAP store?

Environment

VIP AuthHub

Resolution

Customer will require the source IP addresses that will be used when connecting to LDAP from VIP Authentication Hub running in Azure Kubernetes cluster. The source IPs will be the IP addresses of the K8S worker nodes.

Use "kubectl get nodes -o wide" to get the current IP addresses.

NOTE: These IP addresses might change during a K8S upgrade as new worker nodes, with upgraded K8S version, are added to the node pool and old nodes are removed. The node pool may scale, adding additional worker nodes due to higher load, and these nodes will have new IP addresses.

For consistent source IP addresses, the node pool should be configured to use a specific IP CIDR range and then the IP CIDR range added to the firewall rules as a source set of IP addresses.