Prepare your environment with Private Access Connectors, Secure Access Modules, and identify your corporate resources.
Zero Trust Secure Access Private Access requires that you set up your environment and identify your corporate resources before creating rules that control user and device access.
The following lists out the high-level overview of the steps involved in setting up your Zero Trust Private Access environment.
Integrate with your IAM (Identity and Access Management) system.
Deploy Private Access Connectors to the cloud and local infrastructure that host your corporate applications.
Choose how your end users and devices can access the internal applications.
Deploy the Secure Access Module to secure end user access through managed devices.
Set up a User Portal to allow end users to access applications through a browser.
Add your internal applications to Zero Trust Secure Access Private Access.
Manage access to corporate resources and the internet with Private Access rules.