IBM watsonx provides network security mechanisms to protect infrastructure, data, and applications from potential threats and unauthorized access. Network security mechanisms provide secure connections to data sources and control traffic across
both the public internet and internal networks.
Table 1. Network security mechanisms for IBM watsonx
Use private network service endpoints to securely connect to endpoints over IBM private cloud, rather than connecting to resources over the public network. With Private network service endpoints, services are no longer served on an internet
routable IP address and thus are more secure. Service endpoints require virtual routing and forwarding (VRF) to be enabled on your account. VRF is automatically enabled for Virtual Private Clouds (VPCs).
For more information about service endpoints, see:
Private data sources are on-premises data sources that are protected by a firewall. IBM watsonx requires access through the firewall to reach the data sources. To provide secure access, you create inbound firewall rules to allow access for the
IP address ranges for IBM watsonx. The inbound rules are created in the configuration tool for your firewall.
You can configure integrations with third-party cloud platforms to allow IBM watsonx users to access data sources hosted on those clouds. The following security mechanisms apply to integrations with third-party clouds:
An authorized account on the third-party cloud, with appropriate permissions to view account credentials
Permissions to allow secure connections through the firewall of the cloud provider (for specific IP ranges)
For example, you have a data source on AWS that you are running notebooks on. You need to integrate with AWS and then generate a connection to the database. The integration and connection are secure. After you configure firewall access, you
can grant appropriate permissions to users and provide them with credentials to access data.
Connections require valid credentials to access data. The account owner or administrator configures the type of credentials that are required, either shared or personal, at the account level. Shared credentials make the data source and its credentials
accessible to all collaborators in the project. Personal credentials require each collaborator to provide their own credentials to use the data source.
Connections require valid credentials to access data. The account owner or administrator configures the type of credentials that are required at the account level. The connection creator enters a valid credential. The options are:
Either shared or personal allows users to specify personal or shared credentials when creating a new connection by selecting a radio button and entering the correct credential.
Personal credentials require each collaborator to provide their own credentials to use the data source.
Shared credentials make the data source and its credentials accessible to all collaborators in the project. Users enter a common credential which was created by the creator of the connection.
Secure connections provide secure communication among resources in a hybrid cloud deployment, some of which might reside behind a firewall. You have the following options for secure connections between your environment and the cloud:
A Satellite Connector uses a lightweight Docker-based communication that creates secure and auditable communications from your on-prem, cloud, or Edge environment back to IBM Cloud. Your infrastructure needs only a container host, such as
Docker. For more information, see Satellite Connector overview.
A Satellite location provides the same secure communications to IBM Cloud as a Satellite Connector but adds high availability access by default plus the ability to communicate from IBM Cloud to your on-prem location. A Satellite location requires
at least three x86 hosts in your infrastructure for the HA control plane. A Satellite location is a superset of the capabilities of the Satellite Connector. If you need only client data communication, set up a Satellite Connector.
Virtual Private Networks (VPNs) create virtual point-to-point connections by using tunneling protocols, and encryption and dedicated connections. They provide a secure method for sharing data across public networks.
Following are the VPN technologies on IBM Cloud:
IPSec VPN: The VPN facilitates connectivity from your secure network to IBM IaaS platform’s private network. Any user on the account
can be given VPN access.
VPN for VPC: With Virtual Private Cloud (VPC), you can provision generation 2 virtual server instances for VPC with high network performance.
The Secure Gateway deprecation announcement provides information and scenarios for using VPNs as an alternative. See IBM Cloud docs: Migration options.
Allow specific IP addresses
Copy link to section
Use this mechanism to control access to the IBM cloud console and to IBM watsonx. Access is allowed from the specified IP addresses only; access from all other IP addresses is denied. You can specify the allowed IP addresses for an individual
user or for an account.
When allowing specific IP addresses for watsonx.ai Studio, you must include the CIDR ranges for the watsonx.ai Studio nodes in each region (as well as the individual client system IPs that are allowed). You can include the CIDR ranges in IBM
watsonx by following these steps:
From the main menu, choose Administration > Cloud integrations.
Click Firewall configuration to display the IP addresses for the current region. Use CIDR notation.
Copy each CIDR range into the IP address restrictions for either a user or an account. Be sure to enter the allowed individual client IP addresses as well. Enter the IP addresses as a comma-separated list. Then, click Apply.
Repeat for each region to allow access for watsonx.ai Studio.
If you are running IBM watsonx behind a firewall, you must allowlist third party URLs to provide outbound browser access. The URLs include resources from IBM Cloud and other domains. IBM watsonx requires access to these domains for outbound
browser traffic through the firewall.
This list provides access only for core IBM watsonx functions. Specific services might require additional URLs. The list does not cover URLs required by the IBM Cloud console and its outbound requests.
Table 2. Third party URLs allowlist for IBM watsonx
Domain
Description
*.bluemix.net
IBM legacy Cloud domain - still used in some flows
*.appdomain.cloud
IBM Cloud app domain
cloud.ibm.com
IBM Cloud global domain
*.cloud.ibm.com
Various IBM Cloud subdomains
dataplatform.cloud.ibm.com
IBM watsonx Dallas region
*.dataplatform.cloud.ibm.com
CIBM watsonx subdomains
eum.instana.io
Instana client side instrumentation
eum-orange-saas.instana.io
Instana client side instrumentation
cdnjs.cloudflare.com
Cloudflare CDN for some static resources
nebula-cdn.kampyle.com
Medallia NPS
resources.digital-cloud-ibm.medallia.eu
Medallia NPS
udc-neb.kampyle.com
Medallia NPS
ubt.digital-cloud-ibm.medallia.eu
Medallia NPS
cdn.segment.com
Segment JS
api.segment.io
Segment API
cdn.walkme.com
WalkMe static resources
papi.walkme.com
WalkMe API
ec.walkme.com
WalkMe API
playerserver.walkme.com
WalkMe player server
s3.walkmeusercontent.com
WalkMe static resources
Multi-tenancy
Copy link to section
IBM watsonx is hosted as a secure and compliant multi-tenant solution on IBM Cloud. See Multi-Tenant
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.