Prepare your environment with Private Access Connectors, Secure Access Modules, and identify your corporate resources.
Zero Trust Secure Access Private Access requires that you set up your environment and identify your corporate resources before creating rules that control user and device access.
The following lists out the high-level overview of the steps involved in setting up your Zero Trust Private Access environment.
Deploy Private Access Connectors to the cloud and local infrastructure that host your corporate applications.
Choose how your end users and devices can access the internal applications.
Add your internal applications to Zero Trust Secure Access Private Access.