See the authentication methods available for connecting to the internet using Internet Access.
Zero Trust Secure Access Internet Access provides several methods for authentication
to the
Internet Access service for access to external web sites and resources. Considerations
include
the gateway being used, gateway configuration options, whether the endpoint has the
Secure Access
Module installed, and the configured single sign-on (SSO) method.
Authentication method
|
Secure Access Module status
|
Gateway
|
SSO method | Details | ||
SAML-based SSO with IAM integration
|
Installed or not installed
|
Internet Access Cloud Gateway or On-Premises Gateway (Proxy mode)
|
SAML-based SSO using an integrated IAM system
|
|||
NTLM v2 or Kerberos-based SSO
|
Installed or not installed
|
Internet Access Cloud Gateway or On-Premises Gateway (Proxy mode)
|
NTLM v2 or Kerberos-based SSO through Internet Access On-premises Authentication Proxy
service
|
|||
Private IP bypass
|
Not installed
|
Internet Access Cloud Gateway or On-Premises Gateway (Proxy mode)
|
Not required if endpoints connect from private IP addresses on the user authentication
bypass list
|
|||
Unenforced authentication
|
Not installed
|
Internet Access On-Premises Gateway
|
Not required if:
|