Setting Up Zero Trust Secure Access Internet Access

Prepare your environment with Secure Access Modules or internet proxies.

Zero Trust Secure Access Internet Access requires that you set up your environment before creating rules that control user and device access.

The following lists out the high-level overview of the steps involved in setting up your Zero Trust Internet Access environment.

  1. Integrate with your IAM (Identity and Access Management) system.

  2. Identify your corporate network locations.

  3. Choose how your end users and devices send traffic to the Internet Access Gateway.