Trusted domains
Domains allow list is one of the most effective methods of ensuring this and prevents any internet traffic intended for nBold from being hijacked or rerouted to a rogue website.
Our complete portfolio of domains is outlined below to help our customers configure their corporate network security components.
nBold App and API
Domains/Hosts:
*.salestim.io
*.nbold.io
Justification/Purpose: nBold main web application for Microsoft Teams
nBold Documentation
Domains/Hosts: *.nbold.co
Justification/Purpose: nBold documentation embedded into the Microsoft Teams app
Microsoft Azure Application Insight
Domains/Hosts:
az416426.vo.msecnd.net
dc.services.visualstudio.com
Justification/Purpose: Azure service used by nBold to collect anonymous performance metrics, telemetry and application logs/traces. More infos
Microsoft Azure Blob Storage
Domains/Hosts: stappsaprd.blob.core.windows.net
Justification/Purpose: Storage used by nBold to store templates pictures/icons
Microsoft Graph API
Domains/Hosts: graph.microsoft.com
Justification/Purpose: API used by nBold to interact with Microsoft 365 services
Intercom
Domains/Hosts:
*.intercom.com
*.intercom.io
*.intercomassets.com
*.intercomcdn.com
Justification/Purpose: Used by nBold to bring an embedded support system into the app, and connect end-users and administrators with our support team.
IP ranges allow list
IP ranges allow list is one of the most effective methods of ensuring this and prevents any internet traffic intended for nBold from being hijacked or rerouted to a rogue website.
Our public app and API services are exposed and protected by Microsoft Azure Front Door. Therefore our public IP ranges are publicly documented by Microsoft.
Manual download
To retrieve them:
Download the Azure IP Ranges and Service Tags
json
file.Locate the
AzureFrontDoor.Frontend
entryGet IP ranges from the
addressPrefixes
property.
You can also automate the extraction of these IP ranges, using one of these three options.
Automate via REST interface
curl https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Network/locations/{location}/serviceTags?api-version=2020-07-01
Automate via Powershell
Get-AzNetworkServiceTag -Location <String>
Automate via az cli
az network list-service-tags --location [--subscription]