Alnomoor — table (cafeteria) ordering integration Audience: CYBER-X technical / network / security teams Purpose: Describe HTTP traffic you will receive from Alnomoor (scope, headers, body, source). Your internal POS behaviour is out of scope for this document.
1 Alnomoor domains, outbound scope count & whitelist IP
Public domains (reference)
Use
Domain (HTTPS)
Public website / web table menu
https://alnomoor.com
API (backend) — called by Alnomoor apps
https://api.alnomoor.com
Outbound HTTP scope count (Alnomoor → CYBER-X)
Item
Value
Number of scopes
1 — one integration surface only: POST to the single agreed full URL (CYBERX_API_URL).
HTTP methods toward your URL
POST only (no GET, PUT, etc. for this feature).
Relation to the domains listed above
Those domains are our public surfaces (web / apps). Calls to your server are issued only from server-side code on the Alnomoor website stack (Next.js) when an order is placed — not from browsers directly, and not from a separate outbound integration on https://api.alnomoor.com for this CYBER-X push in the current codebase (apps/website).
IPv4 for your whitelist
Item
Value
IPv4 — please add to allowlist for inbound traffic from this integration
49.13.210.247
Note: Requests to your endpoint (CYBERX_API_URL) originate from egress of the Alnomoor website server (Next.js). If that egress matches 49.13.210.247, use the value above. If production egress differs (load balancer, provider change, etc.), Alnomoor hosting must confirm the new IP and CYBER-X must be notified.
2 What you provide (to connect)
Item
Description
Full HTTPS URL
Single receive endpoint: POST to a URL you define (scheme + host + path + optional query). Stored on our side as CYBERX_API_URL.
Authentication
Bearer — secret token issued or agreed with Alnomoor, stored as CYBERX_TOKEN (never publish in public docs).
3 What you will receive on your server
Direction, method & full scope
Direction: outbound from Alnomoor infrastructure → inbound to the URL you gave us.