Determine whether to use the Secure Access Module to direct end user internet traffic to the Internet Access Gateway.
Zero Trust Secure Access Internet Access provides you the option of using an installed
module on end-user devices or alternative authentication methods to transfer internet
traffic to your Internet Access Gateway, which takes actions based on your Internet
Access rules.
NoteTo manage access to specific AI services and enable advanced AI content generation
checks, go to Secure Access Rules and create at least one AI service access rule.
|
Access Type
|
Description
|
Benefits
|
With the Secure Access Module |
Installed on end-user devices and integrated with your IAM solution, the module transfers
connection attempts to the Internet Access Gateway that enforces Internet Access Control
rules
|
|
Without the Secure Access Module
|
Using PAC files, proxy chaining, or port forwarding forwards your end-user traffic
to the
Internet Access Gateway that enforces Internet Access Control rules
|
|