Ports for Communication between Components

As discussed in Review the Firewall Rules, there are ports required for connections between components. The following summarizes the ports that must be open for inbound communication to manage Privileged Access Service's.

Connector to Active Directory Ports (Inbound)

alt

  • Global Catalog: 3268
  • LDAP: 389
  • Kerberos: 88
  • Kerberos Password: 464
  • SMB/CIFS: 445 for password management
  • Time Service: 123
  • RPC Endpoint Mapper: 135 (allows the connector to join to an Active Directory domain)
  • RPC Endpoint (TCP Dynamic): 49152-65535

Server to the Connector (Inbound)

alt

The server —- sometimes referred to as the cloud or application server —- handles routing of requests and starting the processes used for management operations.

  • HTTPS default port 443
  • DirectTCP port 30001

Ports on the Target Windows Server (Inbound)

alt

  • RDP 3389
  • RPC Endpoint Mapper 135
  • RPC Endpoint (“TCP Dynamic”) 49152-65535

Ports for Discovery, Testing Connectivity, and Password Management mode

  • SMB/CIFS 445
  • WinRM over HTTP 5985
  • WinRM over HTTPS 5986
  • RPC over TCP

Ports on the Connector for the Target Windows Server (Inbound)

alt

  • RDP 3389
  • RPC Endpoint Mapper 135
  • RDP 5555 (TCP) Connector (inbound) For native RDP

Ports on the Target Linux Server (Inbound)

alt

  • SSH 22
  • HTTPS 443

Ports on the Connector for the Linux Server (Inbound)

alt

  • API Proxy (HTTP proxy) 8080

PAS Firewall Rules and Domain settings for External Integrations

When PAS interacts with your external system there may be additional port requirements.

The outbound 443 port is very likely, with a possibly of other ports, including inbound ports.

Example port recommendations:

Example Port Recommendations Protocol
Partner federation / External IDP Outbound / Inbound 443 for external IDP HTTPS
SAML app Outbound / Inbound 443 the application HTTPS
Customer SMTP server Port 22 HTTPS