TinaCloud's authentication and content services communicate with several external domains. If your network uses a firewall, VPN, or proxy that restricts outbound traffic, you will need to whitelist the domains listed below to ensure TinaCMS functions correctly.
Domain | Purpose |
|---|---|
| TinaCloud dashboard and asset delivery |
| Authentication and identity services |
| Content API and data layer |
| Asset management and delivery |
TinaCloud uses AWS Cognito and API Gateway for authentication. The login flow redirects through these domains during sign-in:
Domain | Purpose |
|---|---|
| AWS Cognito hosted UI (OAuth authorization) |
| AWS Cognito Identity Provider API |
| AWS API Gateway (OIDC identity bridge) |
If your project uses GitHub as its git provider (the default for TinaCloud):
Domain | Purpose |
|---|---|
| GitHub OAuth authorization and repository access |
| GitHub API for token exchange and user info |
If your organization uses enterprise SSO through TinaCloud:
Domain | Purpose |
|---|---|
| WorkOS enterprise SSO provider |
If you see a "Login attempt timed out" error when authenticating from a VPN or restricted network, it is likely that one of the authentication domains listed above is being blocked. The sign-in flow must complete a full redirect chain within 20 seconds, and any blocked domain in that chain will cause a timeout.
If you are configuring Content Security Policy headers for your site, see the CSP Configuration guide for the required directives.