IP Addresses to whitelist for rhipe support team

A number of partners and customers have requirements around blocking or restricting access to trusted IP addresses and ranges in order to secure their data and meet various internal requirements and industry certifications.

One way that partners achieve this is by instituting Conditional Access Policies in Azure AD. This means you can restrict access to your tenancy as a whole, or by discrete services. Unfortunately by doing this, it can affect our technical support team to assist you define, isolate, replicate and resolve your issues. We are also often unable to raise an escalation request as we require access via Delegated Admin Permissions to your Office 365 or other Microsoft administration portals to raise these cases.

Where partners have restricted access globally, we ask that you create a 'rhipe' conditional access location, and add the following IP's to it. When you need to grant us access, simply mark that range as trusted until we have been able to resolve your issue, then remove the trusted flag once the issue is resolved.

Our support teams IP addresses are:

  • 61.68.26.210
  • 103.228.59.178
  • 203.220.13.226
  • 209.146.25.90
  • 218.185.237.130
  • 223.130.19.2
  • 211.24.107.228

Please note that this list is subject to change and you should check this KB article (and last revised date) to ensure your conditional access group matches the above.

Conditional Access network locations require CIDR notation within AzureAD. For a single IPv4 address, add '/32' to the end of the IP which signifies a single IP range. IPv6 addressing can vary in local networks, but a single IPv6 address will require a '/128' as a suffix.

Last update: 21/3/2018