Connectivity Options

We supports two methods of connectivity to the Decryptx service:

  1. Managed services
  2. Internet

Managed Services

The recommended connectivity to Bluefin’s Decryptx Platform is via dedicated, managed services. While the Internet has proven very reliable for decryption processing, those seeking guaranteed delivery should consider a managed service. Bluefin has partnered with Transaction Network Services (TNS) for Clients requiring high transaction per second and low latency requirements. Over the managed service, transactions are sent via https. TNS offers numerous connectivity options. Additional information can be found here regarding the service options.

In Bluefin's recommended configuration, transport to Bluefin will be via diverse telecommunication providers. This guarantees both hardware and connectivity diversity for the Decryptx service.

Internet Connectivity

Clients may also connect to Bluefin over the Internet via https. The Internet connectivity option is intended for the following types of Clients:

  1. Clients that do not require a communications SLA since packet delivery over the Internet cannot be guaranteed.
  2. Clients that do not have the infrastructure to support dedicated hardware. For example, clients that use AWS or other "Cloud" based infrastructure for their service delivery.
  3. Clients that are not sensitive to the inherent latency of the Internet.

For Clients connecting to either the Decryptx Certification or Production environments, the Client must provide their source IP addresses to Bluefin. Client IP addresses must be whitelisted for connectivity to the Decryptx environment.



For maintenance and processing availability purposes, entities connecting over the Internet are REQUIRED to support DNS resolution for the processing URL

Decryptx Internet IP Addresses

Decryptx Clients processing over the Internet that wish to whitelist the Decryptx IP addresses in their firewalls should contact Bluefin Bluefin support for a list of IP addresses that should be included in their firewall's configuration.

Did this page help you?