This article lists the Beyond Identity domains and hosts in the internet services.
Some organizations want to control access more strictly and explicitly whitelist the known addresses or route their VPN tunnels differently based on the destination.
The recommended way is to whitelist all hosts in our ecosystem.
Explicitly whitelisting specific hosts is likely to cause an interruption with the authentication service eventually, as our services evolve and we introduce more features that use different hosts.
The following table describes the explicit hosts.