If your institution's firewall configuration does not allow outbound traffic, you must use one of the methods below to establish an outgoing HTTPS connection to these URLs:
- https://api.office.com/discovery/me/FirstSignIn
- https://login.windows.net/common/oauth2/authorize
- https://login.windows.net/common/oauth2/token
- https://api.office.com/discovery/me/Services
- https://outlook.office365.com/api/v1.0/Me/Folders('Inbox')/Messages
- https://outlook.office365.com/api/v1.0/Me/Events
- https://<tenant>-my.sharepoint.com/personal/<site-path>/_api/files
Use one of these methods to permit HTTPS connections to the URLs listed above:
- Add a firewall rule to allow outbound connections (port 80 and port 443) from all web and scalable servers to the URLs listed above.
- Configure a proxy server on the network that allows outbound connections to the URLs listed above by setting the following configuration variables:
- d2l.System.Infrastructure.ProxyAddress - The address of the proxy server. It normally takes the form http://myproxy:8080/ or https://myproxy:8080/ where myproxy is the host name or IP address and 8080 is the port.
- d2l.System.Infrastructure.ProxyBypassAddresses - The addresses or address patterns that should not go through the proxy server. Address patterns take the form scheme://hostname:port/path where scheme is either http or https; hostname can be set as a * wildcard; port can be a specific number or a * wildcard to apply to all port numbers; and path is optional and can also contain a * wildcard.