Please note we provide a if your IT team requires them to whitelist the data sources access.
Information
Note that while configuring a connector, you can refer to variables to adapt your credentials depending on the user context, for example. Look at this for more informations about variables.