Skip to main content
Skip table of contents

K8s/Openshift - Pre-requirements & Network ACL

Network ACL

  1. Overview

Untitled Diagram-1693993363268.png

1. Ports

1.1. Incoming

Description

Source

Destination

Ports

Protocol

Ingress traffic

External Load Balancer / WAF

NodePort

32100, 32102, 32103, 32104, 32105 (*)

TCP

SSO Integration

SSO

External Load Balancer / WAF

443, 8945

TCP

CITRIX Integration

Storefront, Netscaler

External Load Balancer / WAF

443, 8945

TCP

CITRIX Integration

VDA

Domain Controller

389, 636, 3268, 3269

TCP

RADIUS

Client Freeradius Server

External Load Balancer / WAF

31812 (*)

TCP
UDP

(*) = These values can be set in the veridiumid-values.yaml file

1.2. Outgoing

Description

Source

Destination

Ports

Protocol

LDAP

All Nodes

ADDS - LDAP

(636, 3269) or (389, 3268)

TCP

DNS

All Nodes

DNS Server

53

UDP

NTP

All Nodes

NTP Server

123

UDP

SMTP

All Nodes

SMTP

25

TCP

SIEM

All Nodes

SIEM

SMS Gateway - if required

All Nodes

SMS Gateway

443

TCP

Google push - Android Veridium Application

All Nodes

fcm.googleapis.com oauth2.googleapis.com

443

TCP

Apple push Notifications

All Nodes

api.push.apple.com

443

TCP

Fido authenticators metadata

All Nodes

mds.fidoalliance.org

443

TCP

Geolocation database synchronization

All Nodes

http://download.maxmind.com

443

TCP

Mobile Device commercial data

All Nodes

storage.googleapis.com

443

TCP

Map display in Admin Dashboard and SSP frontends

All Nodes and client computers

maps.geoapify.com

443

TCP

Twilio - optional, for sending SMS

All Nodes

api.twilio.com

443

TCP

2. DNS Entries

Before starting the installation, you must configure a DNS entry that will serve as the public endpoint for the VeridiumID services.

Create a fully qualified domain name (FQDN) in the form:

CODE
<environmentName>.<domainName>

This FQDN will be used to expose multiple VeridiumID services on distinct ports.

Both components of the FQDN must be defined in the vid-installer-values.yaml file:

  • domainName - The base domain under which the installation will be accessible.

  • environmentName - The unique name of this installation; this value becomes the subdomain.

Once created, ensure that the FQDN resolves correctly in your DNS before proceeding with the installation.

3. Certificates

The VeridiumID installation requires a valid SSL certificate for the FQDN you have created.

Prepare the certificate in the following format:

  • The certificate must be a PEM-encoded file named server.pem.

  • The file should contain the full certificate chain as required by your environment.

Once the certificate is available, add server.pem to the existing Secret vid-haproxy-certs. After updating the Secret, the vid-haproxy DaemonSet must be restarted to ensure the new certificate is picked up by all running pods.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.