If you are an IronKey Administrator and are attempting to access the Admin Console, you may encounter a login page. Clicking the my.ironkey.com located within the IronKey Control Panel will SSO (Single Sign On) you into the Admin Console, as the unique SSL Certificate on your IronKey is authenticated. If the my.ironkey.com is prompting you with login information, there is more than likely a network component cause this SSO to fail.

We have found that some proxy servers (typically service/cloud-based solutions) use load balancing or round robin. This will cause the SSO to fail because there are 2 connections made when logging into the Admin Console. The IronKey service requires the two connections to originate from the same Class C subnet. If the second connection is coming from a different Class C subnet, the authentication/SSO will fail for security reasons.

A sticky route will need to be configured for IronKey services in your proxy management console. However, if this is not a possible solution you may also use a PAC file to direct all IronKey traffic through a firewall or direct connection. This will prevent SSO failures from occurring, as well as any other IronKey service-related connectivity issues. IronKey currently uses these URLs:

my.ironkey.com (port 80 and 443)
auth.ironkey.com (port 443)
services.ironkey.com (port 443)
update.ironkey.com (port 443)
upda.ironkey.com (port 80)
updb.ironkey.com (port 80)
download.ironkey.com(port 80 and 443)

*You may also add an exception for *.ironkey.com if your proxy/firewall allows wildcards, or place an exception for the subnet.