have certifytheweb app installed on windows server 2025.
the server is behind a firewall that gives it no outgoing internet access (which is best practice i’m being told).
obviously this means the app isn’t able to do anything.
we asked the team managing the firewall to do this (based on what google gemini suggested)
## Outbound Firewall Rules (Egress)
You must allow the **Certify.Service.exe** (usually located in `C:\Program Files\CertifyTheWeb\`) to communicate with the following destinations over **TCP Port 443 (HTTPS)**:
|**Destination Domain**|**Purpose**|
| --- | --- |
|`acme-v02.api.letsencrypt.org`|To communicate with the Let's Encrypt API for cert issuance.|
|`api.certifytheweb.com`|To check for app updates and manage your license.|
|`*.identrust.com` & `*.isrg.trustid.ocsp.identrust.com`|For OCSP (Certificate Revocation) checks and chain validation.|
however, with that applied, it still fails at the point to register the ACME account via Let’s Encrypt. it just tries and eventually fails with "failed to communicate with the certificate authority, check status and ensure system can make outgoing https requests"
is there a set list of URLs/Domains that the app needs to able to communicate with? incoming http and https is aleady setup, so it’ll be the outgoing rules that need adjusted.
I can’t see anywhere that has logs that details what caused the failure.
For extended functionality like update checks and and renewal failure notifications you need to communicate with https://api.certifytheweb.com
For DNS API providers you would need what API they are using.
To test these, open a web browser or use powershell on the actual server and try one of the above URLs.
I don’t recommend filtering by process as our process name etc may change (it does change in v7), and if you are using windows firewall it quite often needs a reboot to actually take changes properly.
And if you are a licensed customer then in most cases you are best to skip the community forum for support and email support at certifytheweb.com instead.
note that when i say firewall i’m referring to an external firewall on the network, not the local firewall on the server.
neither of those 2 URLs respond in browser or powershell, so that suggest that the firewall is still blocking these even though admin suggested they had opened them on the firewall.
the 2 URLs do resolve via DNS (our local DNS server). so at least it’s not a DNS issue
note that https://api.certifytheweb.com doesn’t load in a browser even on a system with no restrictions, so maybe using a browser as a test for that isn’t accurate?