Skip to main content
Domains to whitelist
Rob avatar
Written by Rob
Updated over 10 months ago

Trusted domains

Domains allow list is one of the most effective methods of ensuring this and prevents any internet traffic intended for nBold from being hijacked or rerouted to a rogue website.

Our complete portfolio of domains is outlined below to help our customers configure their corporate network security components.

nBold App and API

  • Domains/Hosts:

    • *.salestim.io

    • *.nbold.io

  • Justification/Purpose: nBold main web application for Microsoft Teams

nBold Documentation

  • Domains/Hosts: *.nbold.co

  • Justification/Purpose: nBold documentation embedded into the Microsoft Teams app

Microsoft Azure Application Insight

  • Domains/Hosts:

    • az416426.vo.msecnd.net

    • dc.services.visualstudio.com

  • Justification/Purpose: Azure service used by nBold to collect anonymous performance metrics, telemetry and application logs/traces. More infos

Microsoft Azure Blob Storage

  • Domains/Hosts: stappsaprd.blob.core.windows.net

  • Justification/Purpose: Storage used by nBold to store templates pictures/icons

Microsoft Graph API

  • Domains/Hosts: graph.microsoft.com

  • Justification/Purpose: API used by nBold to interact with Microsoft 365 services

Intercom

  • Domains/Hosts:

    • *.intercom.com

    • *.intercom.io

    • *.intercomassets.com

    • *.intercomcdn.com

  • Justification/Purpose: Used by nBold to bring an embedded support system into the app, and connect end-users and administrators with our support team.

IP ranges allow list

IP ranges allow list is one of the most effective methods of ensuring this and prevents any internet traffic intended for nBold from being hijacked or rerouted to a rogue website.

Our public app and API services are exposed and protected by Microsoft Azure Front Door. Therefore our public IP ranges are publicly documented by Microsoft.

Manual download

To retrieve them:

You can also automate the extraction of these IP ranges, using one of these three options.

Automate via REST interface

curl https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Network/locations/{location}/serviceTags?api-version=2020-07-01

Automate via Powershell

Get-AzNetworkServiceTag -Location <String>

Automate via az cli

az network list-service-tags --location [--subscription]


Did this answer your question?