Security

Firewall Configuration

Configure your firewall and proxy to allow the Ambient endpoint agent to connect.

Last updated: February 22, 2026

The Ambient endpoint agent communicates with the Ambient cloud over HTTPS. This guide lists all required firewall rules and proxy configuration options.

Required Outbound Rules

All connections are outbound from the endpoint. No inbound firewall rules are required.

DestinationPortProtocolPurpose
api.ziviso.africa443HTTPSAgent API (policy sync, content delivery, analytics)
cdn.ziviso.africa443HTTPSWallpaper, screensaver, and lockscreen asset delivery
auth.ziviso.africa443HTTPSSSO / identity token validation
updates.ziviso.africa443HTTPSAuto-update manifest and installer download

All connections use TLS 1.2+. Certificate pinning is not used — standard corporate CA roots are respected.

Proxy Support

If your environment routes HTTPS traffic through a proxy:

// C:\ProgramData\Ambient\agent-config.json
{
  "serverUrl": "https://api.ziviso.africa/api/v1",
  "proxyUrl": "http://proxy.yourcompany.com:8080",
  "proxyBypass": "localhost;127.0.0.1;*.internal.company.com"
}

Authenticated proxies (NTLM / Basic):

{
  "proxyUrl": "http://DOMAIN\\username:password@proxy.yourcompany.com:8080"
}

Note: Store proxy credentials securely. On Windows, use the Windows Credential Manager integration rather than plaintext passwords where possible.

SSL Inspection (TLS Interception)

If your proxy performs SSL/TLS inspection, you must add your proxy’s root CA certificate to the system trust store on each endpoint:

Windows:

Import-Certificate -FilePath "C:\Certs\ProxyRoot.cer" -CertStoreLocation Cert:\LocalMachine\Root

Linux:

sudo cp ProxyRoot.crt /usr/local/share/ca-certificates/
sudo update-ca-certificates

The Ambient agent uses the OS certificate store — importing to the system root is sufficient.

Windows Defender Application Control (WDAC) / AppLocker

If your environment uses application allow-listing:

  • Process name: AmbientAgent.exe
  • Publisher: Ziviso (Pty) Ltd — CN=Ziviso (Pty) Ltd, O=Ziviso, C=ZA
  • Installation path: C:\Program Files\Ambient\

Add the publisher or path as an allowed rule in your WDAC/AppLocker policy.

Network Diagnostic

To test connectivity from a device before deploying the agent:

# PowerShell - test API reachability
Invoke-WebRequest -Uri "https://api.ziviso.africa/health" -UseBasicParsing
# Expected: StatusCode 200

If this fails, check your proxy and firewall logs for blocked requests.

On-Premise / Private Cloud

Enterprise plans support private cloud deployment where the Ambient API runs in your own infrastructure. In this configuration, only your internal API endpoint needs to be reachable. Contact sales@ziviso.africa for on-premise deployment options.