Managing Policies and Rules with Zero Trust

Perimeter 81's Zero Trust Access allows you to easily manage application access by creating customized policies with a more granular authentication approach. 

By applying user identification rules, you can seamlessly and continuously protect your organization's applications. The identification access rules can be based on network, device, location, work schedule and connection time.

To get started, you’ll need to add a new policy to your Perimeter 81 account. To create a policy, you will need to add rules for the groups of users who will be assigned to this policy. Once you have applied all the permission rules, the policy will be configured. 

The new policy will be listed in your available policies and you can assign it to any application. To assign an access policy to an application, go to the application tab and under application settings choose the group policy you would like to assign and select Apply.

Now that the policy is set up, this creates a secure, seamless connection between the users and the organization's authorized resources. Also, each user will have secured, zero trust access to critical web applications.

1 out of 1 found this helpful



Please sign in to leave a comment.