<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Reaching Okta Services From a Private Network Without Internet Exposure
Okta Classic Engine
Okta Identity Engine
Network Zones
Overview

Okta services, including <subdomain>.okta.com, require outbound internet access over HTTPS (TCP port 443) and cannot be reached entirely offline. For restricted networks, administrators must securely bridge connectivity using a firewall with IP allow lists, a VPN or reverse proxy, or Okta Access Gateway.

Applies To
  • Okta Identity Engine (OIE)
  • Okta Classic Engine
Solution

How are Okta services reached from a restricted private network?

 

Okta services, including <subdomain>.okta.com, require outbound internet access over HTTPS (TCP port 443). The Okta cloud platform hosts services externally, so direct communication from an internal environment to Okta requires outbound internet access. Okta does not support connecting to <subdomain>.okta.com entirely offline or without some form of controlled internet exposure.

 

To securely bridge connectivity for a restricted network, implement one of the following methods:

  • Firewall with IP allow lists: Allow outbound HTTPS traffic only to Okta IP ranges.
  • VPN or reverse proxy: Use a secure tunnel or proxy that connects the private network to the internet, allowing Okta traffic to pass through without exposing internal systems directly.
  • Okta Access Gateway: If internal applications require integration with Okta while remaining private, Okta Access Gateway acts as a reverse proxy between the Okta cloud and the internal network.
Loading
Reaching Okta Services From a Private Network Without Internet Exposure