Post-Domain Registration Access Issues

Post-Domain Registration Access Issues

If you continue having problems accessing your page after domain registration on the Polaris WAAP, such as seeing a 504 Error, please try resolving issues via:

  1. Adding Polaris IP addresses do your domain origin server’s whitelists. This should be a settings function in your domain host. You can find IP addresses to be added here:


  1. Adjust your SSL settings from “Flexible” to “Full” under the domain’s settings in the WAAP platform. 

If issues persist, please reach out to us for immediate support -

    • Related Articles

    • 7. Zero Trust Access (ZTA) - Custom Access Domain

      A part of the Zero Trust Access feature is allowing for a customized access domain so that authorized users can log into your zero trust applications. Within the Zero Trust settings, you'll find this option under the Configuration tab.    Note: If ...
    • GEO Access

      What is GEO Access? GEO Access restricts access to your website based on geographical location. You can allow or block all visitors from certain countries. The GEO Access setting can be found in the "Access Control" tab of your website's settings. To ...
    • 2. Zero Trust Access (ZTA) - Add Providers (SSO)

      General Providers are 3rd parties that have authentication and authorization services such as Google or Microsoft. Most all organization emails belong to these 3rd parties so we can utilize those already existing logins for any applications that you ...
    • Getting Started with Polaris - Registration

      Thank you for using Polaris to secure your website. This guide will go through the basics of setting up your website(s) on Polaris and how to navigate the interface. The guide will also help you understand the various settings and what they mean for ...
    • 1. Zero Trust Access (ZTA) Overview

      ZERO TRUST ACCESS Polaris Zero Trust Access (ZTA) feature is designed to provide more control over applications as users can provision a login system to existing applications so that all access is first verified and authorized. Essentially, in order ...