Perimeter 81's Zero Trust Application Access allows you to provide your workforce with secured, zero trust access to popular web applications - without an agent. Based on customized protocols, you can deploy four types of application access to your workforce.
To get started, you’ll need to add an application to your Perimeter 81 account. Next, you will need to configure the application by filling out the general settings form. Also, you will have the option to choose which groups of users will have access to the application and which policy will be included.
Now, a list of the applications that you have deployed will be available. To change the application permissions access, select the application setting option. Now you will have full control of the application’s settings including rules of access.
For each policy, you can set up customized rules for user's access. The identification rules can be based on network, device, location, work schedule and connection time. If the user's identification and policy rules match up, you will have access to the application deployed on the network.
Each user will see a complete list of available applications that you have permission to access. Once you select the application you will be automatically connected and will be able to work securely.
For more information, see the Zero Trust and Applications article.