Prepare your environment with Private Access Connectors, Secure Access Modules, and identify your corporate resources.
Zero Trust Secure Access Private Access requires that you set up your environment
and identify
your corporate resources before creating rules that control user and device access.
The following lists out the high-level overview of the steps involved in setting up
your Zero
Trust Private Access environment.
-
Deploy Private Access Connectors to the cloud and local infrastructure that host your corporate applications.
-
Choose how your end users and devices can access internal applications.
-
Deploy the Secure Access Module to secure end user access through managed devices.
-
Set up a User Portal to allow end users to access applications through a browser.
-
-
Add your internal applications to Zero Trust Secure Access Private Access.
-
Manage access to corporate resources and the internet with private access rules.