Understanding Zero-Trust Application?
Perimeter81's Application Access feature secures your users' access to privately owned resources via their web browser without a need to install any VPN software on the computer.
You would first need to spin up a Perimeter81 private network and make sure that this network has an IPSEC Tunnel or a Wireguard connector which will allow communication with the internal host that you wish to secure.
- Securing access to publicly accessible websites or SaaS providers (Such as Microsoft Office 365 or Gmail) is not supported using Perimeter81's Zero Trust Application Access.
- In order to secure access to such public websites - the Perimeter81 Agent might be a better fit.
How to Manage Zero Trust Applications
To get started, you’ll need to add an application to your Perimeter 81 account. Next, you will need to configure the application by filling out the General Settings form. Also, you will have the option to choose which groups of users will have access to the application and which policy will be included.
Now, a list of the applications that you have deployed will be available. To change the application permissions access, select the application setting option. Now you will have full control of the application’s settings including rules of access.
For each policy, you can set up customized rules for users' access. The identification rules can be based on network, device, location, work schedule, and connection time. If the user's identification and policy rules match up, you will have access to the application deployed on the network.
Each user will see a complete list of available applications that you have permission to access. Once you select the application you will be automatically connected and will be able to work securely.
After you have created an application, a list of the applications that you deployed will be available. You will be able to switch which group of users will have access and which policy will be enabled for the application. If the user's identification and policy rules match up, they will have access to the application deployed on the network.
Each user will see a complete list of available applications that they have permission to access.
Once they select the application they will be automatically connected and will be able to work more securely.
Favorite applications will appear first in the list and are retained across different browsers and devices for the same user.
- Regularly review who has access to what resources.
- Use strong authentication mechanisms.
Specific articles on how to configure your Application Access per the desired protocol you wish to secure:
- How to add an SSH application
- How to add an HTTPS application
- How to add an HTTP application
- How to add an RDP application
- How to add a VNC application