Azure Port open question for integrating SailPoint IIQ with Azure DMZ

Padmagopal, Madhav 0 Reputation points
2025-05-01T14:24:07.63+00:00

We are aware that all IIQ Applications needs IQ Service host machine's port 5050 to be opened for communication. However, wanted to know if the below ports needs to be opened as recommended by Azure to have read/write communication between IIQ Application and the host machine where IQ Service is installed. LDAP Port 389 and 636 Kerberos Port 88 Active Directory Web Service 9389 Active Directory port 3268 (if a global catalog is configured) Active Directory port 3269 (if a global catalog is configured) Active Directory DNS Port 53 Active Directory replication, login services port 445 Kerberos Password port 464 Authentication port UDP 137 Authentication port TCP 139

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
8,743 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Suwarna S Kale 2,211 Reputation points
    2025-05-01T15:43:00.7033333+00:00

    Hello Padmagopal, Madhav,

    Thank you for posting your question in the Microsoft Q&A forum. 

    Integrating SailPoint IdentityIQ (IIQ) with Azure DMZ requires careful consideration of network port configurations to ensure seamless communication between IIQ components and Active Directory (AD) services. While the IQ Service port (5050) is mandatory for internal IIQ communication, additional ports must be opened to support LDAP queries, Kerberos authentication, Global Catalog lookups, and AD replication.   

    • LDAP & Secure LDAP (Ports 389 & 636) – Required 
      • Port 389 (TCP/UDP) is essential for standard LDAP queries when IIQ fetches user/group data from AD. 
      • Port 636 (TCP) is required for LDAPS (LDAP over SSL/TLS), ensuring encrypted communication for compliance (e.g., GDPR, HIPAA).  Without these, IIQ cannot retrieve or modify AD objects (users, groups, OUs). 
    • Kerberos Authentication (Ports 88 & 464) – Required for SSO & Password Sync 
      • Port 88 (TCP/UDP) is critical for Kerberos ticket-granting service (TGT) exchanges, enabling SSO and AD-integrated authentication. 
      • Port 464 (TCP/UDP) is used for Kerberos password changes (e.g., self-service password reset in IIQ).  If Kerberos is blocked, IIQ cannot validate user credentials or enforce password policies. 
    • Active Directory Web Services (Port 9389) – Conditionally Required 
      • Port 9389 (TCP) is used for AD Web Services (ADWS), which modern PowerShell-based AD modules rely on. 

    Required only if IIQ uses PowerShell scripts for AD automation. If using pure LDAP, this port may be optional. 

    • Global Catalog Ports (3268 & 3269) – Required for Multi-Domain Forests 
      • Ports 3268 (TCP) and 3269 (TCP) are needed when IIQ queries the Global Catalog in multi-domain AD forests. 
      If IIQ only interacts with a single domain, these ports may not be necessary. However, most enterprises use Global Catalog for faster searches across domains. 
    • DNS (Port 53) – Required for AD-Integrated DNS 
      • Port 53 (TCP/UDP) ensures IIQ can resolve AD domain controller hostnames. 
      Without DNS, IIQ cannot locate domain controllers, leading to LDAP/Kerberos failures. 
    • NetLogon & SMB (Ports 445, 137, 139) – Conditionally Required 
      • Port 445 (TCP) is critical for SMB-based AD functions (Group Policy, sysvol replication). 
      • Ports 137 (UDP) & 139 (TCP) are legacy NetBIOS ports, rarely needed unless IIQ interacts with older AD systems. 
      Port 445 is mandatory for AD replication and GPO processing, while 137/139 are optional unless legacy systems are involved. 

    Some security recommendation you may want to review: 

    1. Least Privilege Access – Only allow these ports between IIQ servers and AD controllers, not publicly. 
    2. Private Link / Service Endpoints – Use Azure Private Link to securely connect IIQ to AD without exposing ports to the internet. 
    3. Logging & Monitoring – Enable Azure Network Watcher to detect unauthorized access attempts. 
    4. Just-in-Time (JIT) Access – Restrict port access to specific IPs/time windows via Azure Security Center. 

    If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated. 

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.