Skip to main content
If Granola works on one network but not another, or stops working when your company VPN, proxy, firewall, or web filtering software is enabled, the issue may be network filtering rather than audio permissions or app settings. This guide is useful for IT teams configuring tools like Zscaler, proxy appliances, SSL inspection, or other network security software.

What to ask your IT team to allow

Granola relies on secure HTTPS and WebSocket connections. If your organization filters traffic, ask your IT team to allow direct connections to the domains below and avoid rewriting, redirecting, or SSL/TLS-intercepting them. Not every customer needs every domain below. The exact list depends on which Granola features you use.

Core Granola app access

These are the most important domains for signing in, loading notes, and connecting the desktop app to Granola services.
DomainWhat it’s used for
api.granola.aiMain Granola API
*.api.granola.aiGranola API subdomains, including streaming endpoints such as stream.api.granola.ai
notes.granola.aiGranola web app, shared notes, and some desktop sign-in handoff flows
join.granola.aiWorkspace join links
meet.granola.aiMeeting consent pages
recipes.granola.aiRecipe and template sharing
granola.aiMain website, including install and demo links
www.granola.aiMain website alias

App downloads and updates

Allow these if users need to download Granola, reinstall it, or receive in-app updates.
DomainWhat it’s used for
download.granola.aiGranola download service
dr2v7l5emb758.cloudfront.netCurrent file delivery CDN for Windows downloads and updates
go.granola.aiShort links used for download and install flows
go.granola.soShort links used in some download and documentation flows

Transcription and voice features

Allow these if users need live transcription or voice dictation to work.
DomainWhat it’s used for
api.deepgram.comPrimary Deepgram transcription endpoint
*.api.deepgram.comCovers dedicated Deepgram endpoints used in some configurations
streaming.assemblyai.comAssemblyAI transcription endpoint
api.groq.comVoice dictation formatting
*.lambda-url.us-east-1.on.awsFallback or legacy AWS-hosted transcription-related routes that may still be needed in some environments

Sign-in, SSO, and calendar sync

Allow the providers your organization uses.
DomainWhat it’s used for
auth.granola.aiGranola sign-in and SSO (custom domain hosted by WorkOS)
mcp-auth.granola.aiAuth for Granola MCP and API access
api.workos.comGranola sign-in and SSO broker
*.workos.comAdditional WorkOS auth flows used during sign-in
accounts.google.comGoogle sign-in
www.googleapis.comGoogle profile and Google Calendar access
login.microsoftonline.comMicrosoft sign-in
graph.microsoft.comMicrosoft Graph and Outlook calendar access
cognito-identity.us-east-1.amazonaws.comAWS Cognito Identity, used during authentication

Notifications

DomainWhat it’s used for
api.knock.appIn-app notification delivery

Documentation and help center

DomainWhat it’s used for
docs.granola.aiGranola help center and API documentation
status.granola.aiGranola service status page

Optional shared-note collaboration

Most users do not need this section for basic note-taking or transcription. Allow it if you use shared notes or folders with live collaboration.
DomainWhat it’s used for
*.granola.clubReal-time collaboration services for shared notes and folders

DNS CNAME targets for SASE and advanced DNS filtering

Most organizations do not need this section. If your network security solution inspects DNS CNAME chains (common with SASE products such as Zscaler, Netskope, and Palo Alto Prisma Access), you may also need to allow the underlying DNS targets that Granola domains resolve to.
DomainWhat it’s used for
cname.workos-dns.comDNS target for auth.granola.ai (sign-in and SSO)
cname.mintlify-dns.comDNS target for docs.granola.ai (help center and documentation)

What blocked or redirected requests can look like

When network security software blocks, redirects, or inspects these requests, Granola may fail in ways that do not obviously look like a networking problem. Common symptoms include:
  • Sign-in never completes — the Google, Microsoft, or SSO browser flow loops, stalls, or fails to return to Granola.
  • Calendar sync fails — meetings do not appear in Coming up, or calendars do not stay connected.
  • Transcription never starts — the live transcript stays empty even when audio permissions and devices are correct.
  • Transcription starts, then disconnects — Granola connects briefly and then drops or repeatedly retries.
  • Notes or shared links do not load — shared note pages, desktop notes, or note content stay stuck loading.
  • Updates or reinstalls fail — the app cannot download an update, or the installer download is blocked.
  • Granola only fails on one network — the app works on a home network or hotspot but not on your office network, VPN, or filtered Wi-Fi.
  • Certificate or secure connection errors — TLS inspection, untrusted certificates, or HTTPS rewriting can prevent Granola from opening secure API or WebSocket connections.
  • Unexpected login or warning pages appear — some filtering products redirect blocked requests to an HTML warning page or captive portal, which breaks sign-in, downloads, and real-time connections.

Common things to try

If you’re not sure whether the issue is network-related, these checks usually help narrow it down quickly:
  1. Try another network — for example, a mobile hotspot or home Wi-Fi. If Granola works there, the issue is likely your company network, VPN, proxy, or filter.
  2. Temporarily disable VPN or proxy software — if allowed by your organization, test Granola without it.
  3. Ask IT to exclude the domains above from SSL/TLS inspection — secure WebSocket connections used for transcription can fail even when the domains are technically reachable.
  4. Check whether blocked traffic is being redirected — if your security tool replaces requests with a warning page or login page, Granola may show blank pages, loading states, or failed sign-in.
  5. Test DNS resolution — some users find the issue is their DNS resolver rather than the app itself. As a temporary test, try a public DNS resolver such as 8.8.8.8.
  6. Remove untrusted certificates — if your machine has a certificate installed for HTTPS inspection and it is not trusted by the system, Granola may fail to establish secure connections.

When to use this guide vs other troubleshooting articles

If you’ve already confirmed that audio settings and permissions are correct, and Granola still only fails on certain networks, send this article to your IT team along with the domains above.