In This Article
This article explains how Asana uses IP addresses and hostnames, and how your network or security team can safely allow access to Asana.
It is written for admins, IT, and security teams who manage firewalls, secure web gateways, or other network controls for people using Asana.
Asana does not publish a fixed list of IP address ranges for you to allowlist. Asana uses modern cloud infrastructure and content delivery networks. The underlying IPs can and do change over time as our providers operate and optimise their services.
Because of this, relying on individual IP addresses is brittle. Rules that are pinned to a small set of IPs can start blocking traffic when the infrastructure behind Asana changes. A hostname based approach is more stable and easier to maintain.
The recommended way to control access to Asana is to allow traffic based on DNS hostnames, over HTTPS, with certificate validation. When you allow outbound HTTPS to the Asana domains listed below, your users can sign in and work in Asana while your existing security controls continue to apply.
In most cases, you should:
If your organisation must maintain IP based firewall rules, your IT or security team can consult the public IP documentation from our cloud providers, such as AWS, and combine that information with the hostname lists below. Because those IP ranges are owned and updated by the providers, Asana cannot guarantee or maintain IP lists on your behalf.
For more detail on how Asana protects your data, you can review our security, privacy, and compliance documentation in the Asana Trust Center.
For non FedRAMP customers, Asana currently recommends allowlisting the following domains for full product use, including attachments and avatars:
These domains cover the core web application, APIs, file uploads and downloads, avatars, and our global content delivery network.
If you know which Asana data region your organisation uses, you can optionally scope S3 specific rules to just the bucket that matches your region and omit the others. If you are not sure which region you are in, allowing all of the listed S3 buckets is the safest option.
For customers using Asana in our FedRAMP environment, Asana recommends allowlisting these domains:
At the time of writing, asanausercontent.com is not yet used in FedRAMP, but content may be served from this domain in the future. Including it in firewall rules now reduces the risk of future access issues when that change happens.
Depending on how your users work with Asana, you may also see traffic to third party services that integrate with Asana, such as Google, Microsoft, Dropbox, or Box. For example, attaching a file from Google Drive or OneDrive requires access to those providers.
Your organisation should decide how to manage access to third party services as part of your wider security posture. Asana does not control or publish IP address lists for those external providers.
IP based firewall rules can be appropriate in some environments, but they are not the most reliable way to manage access to Asana. Asana runs on cloud infrastructure that automatically scales and shifts traffic. That means the set of IPs used to serve Asana can change over time.
If you pin your allowlist to a small set of static IPs, your users can lose access when the infrastructure behind Asana changes. Investigating and updating those rules often takes longer than adjusting hostname based controls.
Hostname based rules are more stable because they follow DNS. As our infrastructure evolves, DNS continues to point your clients to the correct endpoints, while your firewall rules still check that traffic is going to the domains you approved.
If your security policies require IP based controls, we recommend combining hostname based rules with the cloud provider documentation your team already uses, and reviewing those IP based controls regularly.
Asana does not provide a static list of IP addresses for you to allow. The infrastructure that serves Asana changes over time, so any static IP list would quickly become inaccurate and could lead to service interruptions. Instead, we recommend allowing access based on the Asana hostnames listed above.
No. Asana does not allocate customer specific IP address ranges or hostnames. Multiple customers share the same infrastructure and domains.
Yes. The recommended domains cover the core web application, APIs, mobile apps, and access to attachments and avatars. If your organisation uses additional integrations or third party services, you may need to allow those providers separately.
If your security team has detailed questions about the domains listed here, your Asana account team or support contact can work with you. They can confirm the latest guidance from our Infrastructure and Security teams and help you understand how it applies to your environment.
Your team can also review our documentation in the Asana Trust Center.