How to Manage Application Access with Perimeter 81

preview_player
Показать описание
Meet Perimeter 81's Zero Trust Application Access.

The cutting-edge solution that allows organizations to provide their workforce with secured, zero trust access to popular web applications -- without an agent.

Based on customized protocols, organizations can deploy four types of application access to their workforce.

To get started, you’ll need to add an application to your Perimeter 81 account.

Next, you will need to configure the application by filling out the general settings form. Also, you will have the option to choose which groups of users will have access to the application and which policy will be included.

Now, a list of the applications that you have deployed will be available.

To change the application permissions access, click on the application setting option.

Now you will have full control of the application’s settings including rules of access.

For each policy, you can set up customized rules for users access. The identification rules can be based on network, device, location, work schedule and connection time.

If the user's identification and policy rules match up, they will have access to the application deployed on the network.

Each user will see a complete list of available applications that they have permission to access.

Once they click on the application they will be automatically connected and will be able to work securely.

Рекомендации по теме
welcome to shbcf.ru