New Admins: Register for our new Pure Lecture Series!
Pure's logos
Pure Help Center for Pure Administrators

If you are a researcher, or other non-admin at your institution, click here.

  • Home
  • Announcements
  • Release Notes
  • Technical user guides
  • Training
  • Events
  • Support
  • Contact Us
  • Home
  • Training
  • Technical user guides
  • Integrations
  • Synchronizations
  • General synchronisation information

How Can We Help?

Search Results

Filter By Category

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Contact us

Securing access to a synchronization sourceSecuring access to a synchronization source

For both of our supported synchronization methods we expect the customer to expose a data source to our environment over the internet.

There are a number of options to provide a defense in depth strategy to this potentially sensitive data source. Our recommendations are:

  1. Only allow access from our outgoing IPs (see Hosting and installation, Outgoing IPs (NAT Gateways)) on the needed ports to the data source. Please note that these IP's are shared across all hosted customers in the region so this cannot be a stand-alone measure
  2. Ensure encrypted communication
    1. For XML based solutions make sure to use TLS
    2. For database based solutions we recommend tunneling the traffic through an SSL tunnel (see SSH Tunnel from Pure server to Customer network) if the database doesn't natively support encrypted communications
  3. Ensure that the data source requires authentication
    1. For XML based solutions we support Basic auth, Header based auth, and S3 credentials if hosted in AWS
    2. For database based solutions we support the normal database username/password authentication mechanism

Generally we recommend that customers consider partitioning the components and data so that only data needed for the Pure synchronization is included in the data source where access is provided. This would in particular mean not to expose a multi-tenant database in this manner. 

Published at January 04, 2024

Download
Related Articles
  • Synchronisation Non-explicit Id Matching
  • Synchronisation Non-explicit Id Hints
  • How to find classification values for the synchronisations
  • Pure API or XML synchronization?
  • Moving from database to XML synchronizations
Keywords
  • sync source
  • secure access
  • securing access to a synchronization source

Was this article helpful?

Yes
No
Give feedback about this article

    About Pure

  • Announcements

    Additional Support

  • Events
  • Client Community
  • Training

    Need Help?

  • Contact Us
  • Submit a Support Case
  • My Cases
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
Elsevier logo Relx logo

Copyright © 2025 Elsevier, except certain content provided by third parties.

  • Terms & Conditions Terms & Conditions
  • Privacy policyPrivacy policy
  • AccesibilityAccesibility
  • Cookie SettingsCookie Settings
  • Log in to Pure Help CenterLog in to Helpjuice Center

Knowledge Base Software powered by Helpjuice

Expand