System Requirements

Supported Devices & System Requirements

From Apple iOS & Android devices to Desktops

learn what System Requirements you will need

LAST UPDATED: March 7, 2023

TigerConnect works on both iOS and Android smartphones and tablets as well as popular web browsers. Compatible devices include the iPhone, iPad, iPod Touch, and various Android devices. Below you will find a list of devices, web browsers, and operating systems that are compatible with the TigerConnect application as well as the minimum system requirements for each.

To ensure the integrity of TigerConnect message delivery, please implement the system requirements shown below.

AMAZON CDN

TigerConnect runs on the Amazon Web Services (AWS) elastic cloud infrastructure. Due to the nature of elastic scaling in response to dynamic throughput needs, the TigerConnect server application may communicate from a range of different IP addresses. Clients with network firewalls in place must proactively allow communications to this range of IP addresses. There are over 10 million public IP addresses contained within the AWS infrastructure. For this reason, TigerConnect strongly discourages the use of an OSI Layer 3 (network) firewall to restrict access via whitelisted IP addresses, as this may unnecessarily open the customer’s infrastructure to a wider attack surface. Rather, we encourage the use of OSI Layer 7 (application) firewall rules to restrict access and only allow HTTPS traffic to the *.tigertext.com, *.tigertext.me, *tigerconnect.com, *.med.tc domains.

Customers may decide to use OSI Layer 3 firewalls, accepting the risk inherent in whitelisting large ranges of IP addresses that may not be used for TigerConnect, including without limitation the risk of allowing access to the customer’s private network by outside parties. The list of current AWS IP addresses may be consumed in JSON format from Amazon. See https://aws.amazon.com/blogs/aws/aws-ip-ranges-json for more information.

Proxy or Firewall

Ensure that the following sites are not blocked:

NOTE: Append both ‘https://’ or ‘https:// to properly whitelist the below URLs.

  • *.env-tigerconnect-premium.kinsta.cloud
  • *.tigertext.com
  • *.tigertext.me
  • *.med.tc

If a wildcard domain is not an option, below are the Fully Qualified Domain Names (FQDNs):

  • access.tigertext.com
  • api.tigerconnect.com
  • api.tigertext.me
  • app.tigerconnect.com
  • assets.tigerconnect.com
  • downloads.tigertext.com
  • home-static.tigertext.com
  • home.tigertext.com
  • idp.tigerconnect.com
  • login.tigerconnect.com
  • static.pro.tigertext.com
  • static.tigertext.me
  • tigerconnect.com
  • tigertext.me
  • d17gddqtitu3hh.cloudfront.net
  • d18oyzjkq5093g.cloudfront.net
  • d1j0wfatttsmrb.cloudfront.net
  • d1n6bomzxlt9xn.cloudfront.net
  • d1pja6kym1wocc.cloudfront.net
  • d20fxgql1qhj06.cloudfront.net
  • d2cfk2smgkkpz1.cloudfront.net
  • d3gw707yjo51bv.cloudfront.net
  • d3jad50r2eiw1v.cloudfront.net
  • d3q3w8yum1wsen.cloudfront.net
  • d4ksvvza57hut.cloudfront.net
  • db5362zp12d6h.cloudfront.net
  • Doypq9et62aku.cloudfront.net
  • dpiu6qal3wq6l.cloudfront.net

NOTE: Similar to whitelisting all AWS IP addresses, it is the customer’s responsibility and risk should they choose to whitelist the entire *.cloudfront.net domain.

White Listing

TigerConnect Service

The following IP addresses and ports must be allowed for outgoing (egress) traffic from your network:
Include Port: 443

54.208.152.3754.208.129.1754.209.103.170
52.8.55.23252.8.75.25252.9.196.218


Email White-Listing

Please ensure the following email addresses are whitelisted to ensure proper delivery of TigerConnect communications:

  • *@*.tigertext.me
  • sendgrid.net

Aliases and reply-to email addresses for TigerConnect emails:

  • messages-noreply@bounce.tigertext.me
  • messages@tigertext.me
  • notification@tigertext.com
  • password-help@tigertext.com

For LDAP Authentication Only

The following IP address and ports must be allowed for users with LDAP Authentication:

IPsPorts
54.208.46.68IIS – 443
LDAPS – 636
54.208.66.88
54.208.83.219
52.8.103.227
52.8.175.5
52.9.188.15

WiFi Setup

  • Access Control – Users must have access to a TigerConnect-approved Wi-Fi network that does not require re-authentication.
  • Mobile Wi-Fi Setup – All users must turn off “Ask to Join Networks” on their mobile devices.
  • Bypass – TigerConnect does not currently support the use of HTTP Proxies or Content Filters. Traffic to the TigerConnect HTTPS and XMPP service ports must bypass HTTP Proxies and Content Filters.

Third-Party Services

To ensure proper serviceability of the TigerConnect ecosystem, the following applications listed in the table below need to be defined in your network and security service definitions for TigerConnect. These third-party systems are utilized in our mobile client applications for iOS, iPad OS, and Android versions of the TigerConnect applications.

NOTE: ALL CONNECTIONS LISTED BELOW ARE EGREES/OUTBOUND FROM THE TIGERCONNECT CLIENT APPLICATION

Application & PurposeIP/PORT/FQDN
TigerConnect

Voice/Video and Patient Engagement
Media Signaling
● global.vss.twilio.com

Media Servers
● 34.203.254.0 – 34.203.254.255
● 54.172.60.0 – 54.172.61.255
● 34.203.250.0 – 34.203.251.255
● 3.235.111.128 – 3.235.111.2551
● 34.216.110.128 – 34.216.110.159
● 54.244.51.0 – 54.244.51.255
● 44.234.69.0 – 44.234.69.1271

Ports
● 10,000 – 60,000 UDP
● 443 UDP
● 3478 UDP

LaunchDarkly

Controls rollout of new
features within the
TigerConnect mobile client
applications

https://app.launchdarkly.com/api/v2/public-ip-list

FQDNs
● app.launchdarkly.com
● stream.launchdarkly.com
● clientstream.launchdarkly.com
● events.launchdarkly.com
● mobile.launchdarkly.com
● sdk.launchdarkly.com
● clientsdk.launchdarkly.com

Ports
● 443 UDP

Pendo Analytics

Utilized for tracking end-user
application interactions

FQDN
www.myPeoplenet.com

IP Addresses
● 64.94.3.200
● 64.94.3.207
● 64.94.3.210

Ports
● 80 UDP
● 443 UDP
Sentry

Used for Application
Performance Monitoring
FQDN
● o4505999279980544.ingest.sentry.io

IP Addresses
● 34.120.195.249/32
34.123.195.156/32

Ports
● 443 UDP

Apple

  • iOS Operating System – 2 most recent major versions of iOS
  • WatchOS Operating System – 2 most recent major versions of watchOS
  • TigerConnect Clinical Collaboration Mobile App – Latest app version
  • TigerConnect Physician Scheduling Mobile App – Latest app version

Android

  • Android Operating System – 5 most recent major versions of Android
  • TigerConnect Clinical Collaboration Mobile App – Latest app version
  • TigerConnect Physician Scheduling Mobile App – Latest app version

Please note: Updates from TigerConnect app versions that are older than the two most recent versions may require users to log back in. TigerConnect Physician Scheduling app releases may require users to log back in.

The TigerConnect Clinical Collaboration Desktop App is available on the systems listed below and includes all the features you need to streamline your workflows.

Hardware

  • The TigerConnect Desktop App installer is less than 250 MB and requires at least 750 MB of disk space for installation.

Windows

  • Windows 10 (32/64-bit)
  • Windows 11 (64-bit)

Mac

  • OS X – Three latest released versions (64-bit only)

Linux

  • Debian – Three latest released versions
  • Ubuntu – Three latest released versions

TigerConnect Desktop App

  • Latest TigerConnect Desktop app version

To download the TigerConnect Desktop Application to your Windows or Mac, Click Here.

Note: TigerConnect provides support on the below browsers for the following URLs:

  • TigerConnect Web Messenger: https://login.tigerconnect.com
  • TigerConnect Physician Scheduling: https://schedule.tigerconnect.com

Supported Browsers for TigerConnect Clinical Collaboration and TigerConnect Physician Scheduling include:

  • Mozilla Firefox
    • PC/Mac: Latest released version
  • Google Chrome
    • PC/Mac: Latest released version
  • Apple Safari
    • (MacOS only): Latest released version
  • Microsoft Edge
    • (Windows Only): Latest released version

TigerConnect Web App

  • Latest TigerConnect web app version

Please reference the following websites to enable and utilize Push Notifications over Wi-Fi connections for iOS and Android devices:

iOS Push Notifications

Android Push Notifications

Note: If your organization has a firewall that restricts the traffic to or from the Internet, you need to configure it to allow connectivity with FCM. The ports to open are 5228, 5229, and 5230. FCM typically only uses 5228, but it sometimes uses 5229 and 5230. FCM doesn’t provide specific IPs, so you should allow your server to accept incoming connections from all IP addresses contained in the IP blocks listed in Google’s ASN of 15169.

Note: This is only applicable to those who utilize TigerConnect’s VoIP Audio or Video Calling feature, or our TigerConnect Patient Engagement Patient Video Feature.

  • Port 443 must be open

If Layer 7 filtering is used whitelist the following URLs:

  • global.vss.twilio.com
  • us1.vss.twilio.com
  • us2.vss.twilio.com
  • endpoint.twilio.com
  • mobile-endpoint.twilio.com
  • sdkgw.us1.twilio.com
  • ecs.us1.twilio.com

If Layer 3 filtering is used whitelist the following IP Addresses ranges:

  • 168.86.128.0/18 with a UDP port range 10000-60000  

PBX System Support

On-Premise

  • Cisco Unified Communications Manager
  • Avaya Communications Manager/Aura
  • Mitel

Cloud

  • RingCentral
  • Vonage
  • 8×8

SBC Support

  • Oracle
  • Ribbon
  • AudioCodes
  • Sansay

Apple

  • Latest released browser version of Safari

Android

  • Latest released browser versions of Chrome, Firefox, and Samsung Internet

Supported browsers include:

  • Windows – Latest released versions of Edge, Chrome
  • Mac – Latest released versions of Safari, Chrome

Supported desktop and servers:

  • Desktop — Support Windows 10 Pro 64
  • Windows Server OS:
    • Windows Server 2019 x64 (recommended)
    • Windows Server 2016 x64 (minimum)
  • General Browser Setting:
    • Please verify you have enabled cookies

Note: This is only applicable to those who have opted for Client-Hosted archiving. This does not apply to TigerConnect-Hosted Archiving.

  • TLS must be enabled
  • Port 587 must be open
  • White-list the following:
  • MTA Server IP addresses:
    • 54.208.46.68
    • 54.208.66.88
    • 54.208.83.219
    • 52.8.103.227
    • 52.8.175.5
    • 52.9.188.15
  • Rate Limits/Rate Control
    • Email Security Gateways with strict mail flow settings may result in throttling of the TigerConnect MTA. This is
      common with organizations that send a large volume of messages.
       To ensure that you are able to receive all archived messages in a timely manner, remove any rate-limiting applied to TigerConnect Archiving messages.

We support the latest version of the TigerConnect SSO Connector.

Questions

For further questions, please contact your Implementation Specialist or email TigerConnect’s Client Care team at prosupport@tigerconnect.com.