SlideShare a Scribd company logo
What is a
Software-Defined Perimeter?
What is a Software-Defined Perimeter (SDP)?
Simple. Secure. Dynamic.
A new network security model that dynamically
creates 1:1 network connections between
users and the data they access
2
How Does a SDP Work?
Software-Defined Perimeter
Traditional TCP/IP
Not Identity Centric – Allows Anyone Access
Identity-Centric – Only Authorized Users
“Connect First,
Authenticate Second”
“Authenticate First,
Connect Second”
3
SDP Architecture
• Controller is the authentication point,
containing user access policies
• Clients are securely onboarded
• All connections based on mutual
TLS connectivity
• Traffic is securely tunneled from
Client through Gateway
4
Protected
Applications
SDP
Controller
SDP Gateway
(Accepting Host)
SDP Client
(Initiating host)
PKI
Identity
Management
Policy Model
SDP in Action
5
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
Control Channel
Encrypted, Tunneled Data Channel
SDP in Action
6
Controller uses PKI and IAM to establish trust
Controller is an authentication point and policy store
System is administered via graphical admin console
1
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
Control Channel
Encrypted, Tunneled Data Channel
PKI
Identity
Management
Policy Model
Graphical Admin Console
1
SDP in Action
7
Controller uses PKI and IAM to establish trust
Controller is an authentication point and policy store
System is administered via graphical admin console
Gateways protect cloud and network resources
Application network traffic passes through Gateway
1
2
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
2
Control Channel
Encrypted, Tunneled Data Channel
PKI
Identity
Management
Policy Model
Graphical Admin Console
1
3
SDP in Action
8
Controller uses PKI and IAM to establish trust
Controller is an authentication point and policy store
System is administered via graphical admin console
Gateways protect cloud and network resources
Application network traffic passes through Gateway
Clients securely onboarded, authenticate to
Controller, communicate with mutual TLS
1
2
3
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
2
Control Channel
Encrypted, Tunneled Data Channel
PKI
Identity
Management
Policy Model
Graphical Admin Console
1
4
3
SDP in Action
9
Controller uses PKI and IAM to establish trust
Controller is an authentication point and policy store
System is administered via graphical admin console
Gateways protect cloud and network resources
Application network traffic passes through Gateway
Clients securely onboarded, authenticate to
Controller, communicate with mutual TLS
Clients access resources via Gateway
• Mutual TLS tunnels for data
• Real-time policy enforcement by Gateway
1
2
3
4
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
2
Control Channel
Encrypted, Tunneled Data Channel
PKI
Identity
Management
Policy Model
Graphical Admin Console
1
4
3
SDP in Action
10
Controller uses PKI and IAM to establish trust
Controller is an authentication point and policy store
System is administered via graphical admin console
Gateways protect cloud and network resources
Application network traffic passes through Gateway
Clients securely onboarded, authenticate to
Controller, communicate with mutual TLS
Clients access resources via Gateway
• Mutual TLS tunnels for data
• Real-time policy enforcement by Gateway
Controller can enhance SIEM and IDS with detailed
user activity logs
Controller can query ITSM and other systems for
context and attributes to be used in Policies
1
2
3
4
5
Protected
Applications
AppGate
Controller
AppGate
Gateway
AppGate
Client
2
Integration with other
IT and Security Systems
5
SIEM
IDS
ITSM
Control Channel
Encrypted, Tunneled Data Channel
PKI
Identity
Management
Policy Model
Graphical Admin Console
1
All users in ProjectX allowed SSH access to all virtual instances where Tag key
equals SSH and value contains ProjectX, if client Anti-Virus has latest updates
Controller
ProjectX
Device Posture
Multifactor Authentication
Network Location
Contextual Attributes
Enterprise Identity
Auto-detect Cloud Changes
Custom Attributes
Time
Endpoint Agents
Application Permissions
Descriptive Entitlements
All users in ProjectX allowed SSH access to all virtual instances where Tag key
equals SSH and value contains ProjectX, if client Anti-Virus has latest updates
Controller
Identity provider Y
Client will authenticate to controller
• Check for an Identity claim ProjectX
• Launch a script to collect AV state
• Send matching entitlements to client
ProjectX
Device Posture
Multifactor Authentication
Network Location
Contextual Attributes
Enterprise Identity
Auto-detect Cloud Changes
Custom Attributes
Time
Endpoint Agents
Application Permissions
12
Descriptive Entitlements
1
All users in ProjectX allowed SSH access to all virtual instances where Tag key
equals SSH and value contains ProjectX, if client Anti-Virus has latest updates
Controller
Identity provider Y
Client will authenticate to controller
• Check for an Identity claim ProjectX
• Launch a script to collect AV state
• Send matching entitlements to client
Client connects to Gateway
• Brings the descriptive entitlement:
• SSH access to AWS://tag:SSH=*ProjectX* ProjectX
Device Posture
Multifactor Authentication
Network Location
Contextual Attributes
Enterprise Identity
Auto-detect Cloud Changes
Custom Attributes
Time
Endpoint Agents
Application Permissions
13
Descriptive Entitlements
1
2
All users in ProjectX allowed SSH access to all virtual instances where Tag key
equals SSH and value contains ProjectX, if client Anti-Virus has latest updates
Controller
Cloud API
Identity provider Y
Client will authenticate to controller
• Check for an Identity claim ProjectX
• Launch a script to collect AV state
• Send matching entitlements to client
Client connects to Gateway
• Brings the descriptive entitlement:
• SSH access to AWS://tag:SSH=*ProjectX*
Gateway connects to local cloud API
• What are the instances that have a tag
with Key SSH and Value containing
ProjectX
• Translate it to IP access rules
ProjectX ProjectX2
Device Posture
Multifactor Authentication
Network Location
Contextual Attributes
Enterprise Identity
Auto-detect Cloud Changes
Custom Attributes
Time
Endpoint Agents
Application Permissions
14
Descriptive Entitlements
1
2
3
All users in ProjectX allowed SSH access to all virtual instances where Tag key
equals SSH and value contains ProjectX, if client Anti-Virus has latest updates
Controller
Cloud API
Identity provider Y
Client will authenticate to controller
• Check for an Identity claim ProjectX
• Launch a script to collect AV state
• Send matching entitlements to client
Client connects to Gateway
• Brings the descriptive entitlement:
• SSH access to AWS://tag:SSH=*ProjectX*
Gateway connects to local cloud API
• What are the instances that have a tag
with Key SSH and Value containing
ProjectX
• Translate it to IP access rules
Detect changes
• Update IP access rules again
ProjectX ProjectX2
Device Posture
Multifactor Authentication
Network Location
Contextual Attributes
Enterprise Identity
Auto-detect Cloud Changes
Custom Attributes
Time
Endpoint Agents
Application Permissions
15
Descriptive Entitlements
1
2
3
4
Summary
16
Utilizes an authenticate first approach
Removes attacks including zero day, DDOS and lateral movement
The Cloud Fabric can now be extended all the way to the user and device
Leverages legacy applications by extending the SDP Architecture
No longer need traditional network defense equipment (Firewall, VLAN, VPN, etc.)
• Identity-centric security • Policies on user and cloud instances
Identity-Centric Network Security
To Learn More View
Why a Software-Defined Perimeter

More Related Content

PPTX
Cryptzone: What is a Software-Defined Perimeter?
PPTX
Cryptzone AppGate Technical Architecture
PPTX
Zero trust Architecture
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
Microservices Security: dos and don'ts
PDF
API Security In Cloud Native Era
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone AppGate Technical Architecture
Zero trust Architecture
Operational Complexity: The Biggest Security Threat to Your AWS Environment
How to Overcome Network Access Control Limitations for Better Network Security
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Microservices Security: dos and don'ts
API Security In Cloud Native Era

What's hot (20)

PPTX
Security in microservices architectures
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PDF
Gravitee.io
PPTX
The user s identities
PDF
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
PPT
The WiKID Strong Authentication Systems Overview
PDF
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
PPTX
Identity and Client Management using OpenID Connect and SAML
PPTX
Gateway/APIC security
PPTX
Let's get started with passwordless authentication using windows hello in you...
PDF
How to integration DataPower with Zos
PPTX
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
PPTX
Azure security basics
PDF
User expert forum user-id
PPT
From The Hidden Internet: Lesson From 12 Months Of Monitoring
PDF
Token vs Cookies (DevoxxMA 2015)
PDF
[OPD 2019] Web Apps vs Blockchain dApps
PDF
Automation Patterns for Scalable Secret Management
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
PPTX
Microservices Security Patterns & Protocols with Spring & PCF
Security in microservices architectures
How Google Protects Its Corporate Security Perimeter without Firewalls
Gravitee.io
The user s identities
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
The WiKID Strong Authentication Systems Overview
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
Identity and Client Management using OpenID Connect and SAML
Gateway/APIC security
Let's get started with passwordless authentication using windows hello in you...
How to integration DataPower with Zos
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
Azure security basics
User expert forum user-id
From The Hidden Internet: Lesson From 12 Months Of Monitoring
Token vs Cookies (DevoxxMA 2015)
[OPD 2019] Web Apps vs Blockchain dApps
Automation Patterns for Scalable Secret Management
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
Microservices Security Patterns & Protocols with Spring & PCF
Ad

Viewers also liked (16)

PPTX
AppGate: Achieving Compliance in the Cloud
PDF
Наталья Гульчевская. Ретроспектива по Диснею
PPTX
Love in Action: Episcopal Churches Welcome Refugees
PDF
Downtown Wilmington Growth and Development
PPTX
Media phots
PPTX
Reel History
DOCX
Receta de albondigas y sus nutrientes
DOCX
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
DOCX
Modelo de Examen de reparación de Filosofía Undécimo Grado
PPTX
Adopting Kubernetes with Puppet
PPTX
Presentation
PPSX
Menú especial
PPT
90 90-90
DOCX
Benjamin Wardell | Recruiters Campaign CV | Contracting
PPTX
"Ελίτσα Μαυρομάτα" από την Έφη
AppGate: Achieving Compliance in the Cloud
Наталья Гульчевская. Ретроспектива по Диснею
Love in Action: Episcopal Churches Welcome Refugees
Downtown Wilmington Growth and Development
Media phots
Reel History
Receta de albondigas y sus nutrientes
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Filosofía Undécimo Grado
Adopting Kubernetes with Puppet
Presentation
Menú especial
90 90-90
Benjamin Wardell | Recruiters Campaign CV | Contracting
"Ελίτσα Μαυρομάτα" από την Έφη
Ad

Similar to Cryptzone: The Software-Defined Perimeter (20)

PPTX
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
PPTX
DEVNET-1124 Cisco pxGrid: A New Architecture for Security Platform Integration
PDF
Hyperledger Fabric update Meetup 20181101
PPTX
API Security in a Microservice Architecture
PDF
Nicolas destor pres_f5agility2018
PDF
APIConnect Security Best Practice
PPTX
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
PDF
Shifting security left simplifying security for k8s open shift environments
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PPT
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
PPT
Novell® iChain® 2.3
PPT
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
PDF
Deploying Next Generation Firewalling with ASA - CX
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
PDF
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
PPT
Implementing Public-Key-Infrastructures
PDF
Workshop AWS IoT @ IoT World Paris
PPTX
Hyperleger Composer Architecure Deep Dive
PPTX
High-Trust Add-Ins SharePoint for On-Premises Development
PPSX
authentication and access control(http://4knet.ir)
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
DEVNET-1124 Cisco pxGrid: A New Architecture for Security Platform Integration
Hyperledger Fabric update Meetup 20181101
API Security in a Microservice Architecture
Nicolas destor pres_f5agility2018
APIConnect Security Best Practice
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Shifting security left simplifying security for k8s open shift environments
Hybrid - Seguridad en Contenedores v3.pptx
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
Novell® iChain® 2.3
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
Deploying Next Generation Firewalling with ASA - CX
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Implementing Public-Key-Infrastructures
Workshop AWS IoT @ IoT World Paris
Hyperleger Composer Architecure Deep Dive
High-Trust Add-Ins SharePoint for On-Premises Development
authentication and access control(http://4knet.ir)

Recently uploaded (20)

PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
System and Network Administraation Chapter 3
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
top salesforce developer skills in 2025.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Digital Strategies for Manufacturing Companies
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
System and Network Administration Chapter 2
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
2025 Textile ERP Trends: SAP, Odoo & Oracle
How to Migrate SBCGlobal Email to Yahoo Easily
Design an Analysis of Algorithms I-SECS-1021-03
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
How Creative Agencies Leverage Project Management Software.pdf
System and Network Administraation Chapter 3
Design an Analysis of Algorithms II-SECS-1021-03
top salesforce developer skills in 2025.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Odoo POS Development Services by CandidRoot Solutions
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Digital Strategies for Manufacturing Companies
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
System and Network Administration Chapter 2
Operating system designcfffgfgggggggvggggggggg
Navsoft: AI-Powered Business Solutions & Custom Software Development
CHAPTER 2 - PM Management and IT Context
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design

Cryptzone: The Software-Defined Perimeter

  • 2. What is a Software-Defined Perimeter (SDP)? Simple. Secure. Dynamic. A new network security model that dynamically creates 1:1 network connections between users and the data they access 2
  • 3. How Does a SDP Work? Software-Defined Perimeter Traditional TCP/IP Not Identity Centric – Allows Anyone Access Identity-Centric – Only Authorized Users “Connect First, Authenticate Second” “Authenticate First, Connect Second” 3
  • 4. SDP Architecture • Controller is the authentication point, containing user access policies • Clients are securely onboarded • All connections based on mutual TLS connectivity • Traffic is securely tunneled from Client through Gateway 4 Protected Applications SDP Controller SDP Gateway (Accepting Host) SDP Client (Initiating host) PKI Identity Management Policy Model
  • 6. SDP in Action 6 Controller uses PKI and IAM to establish trust Controller is an authentication point and policy store System is administered via graphical admin console 1 Protected Applications AppGate Controller AppGate Gateway AppGate Client Control Channel Encrypted, Tunneled Data Channel PKI Identity Management Policy Model Graphical Admin Console 1
  • 7. SDP in Action 7 Controller uses PKI and IAM to establish trust Controller is an authentication point and policy store System is administered via graphical admin console Gateways protect cloud and network resources Application network traffic passes through Gateway 1 2 Protected Applications AppGate Controller AppGate Gateway AppGate Client 2 Control Channel Encrypted, Tunneled Data Channel PKI Identity Management Policy Model Graphical Admin Console 1
  • 8. 3 SDP in Action 8 Controller uses PKI and IAM to establish trust Controller is an authentication point and policy store System is administered via graphical admin console Gateways protect cloud and network resources Application network traffic passes through Gateway Clients securely onboarded, authenticate to Controller, communicate with mutual TLS 1 2 3 Protected Applications AppGate Controller AppGate Gateway AppGate Client 2 Control Channel Encrypted, Tunneled Data Channel PKI Identity Management Policy Model Graphical Admin Console 1
  • 9. 4 3 SDP in Action 9 Controller uses PKI and IAM to establish trust Controller is an authentication point and policy store System is administered via graphical admin console Gateways protect cloud and network resources Application network traffic passes through Gateway Clients securely onboarded, authenticate to Controller, communicate with mutual TLS Clients access resources via Gateway • Mutual TLS tunnels for data • Real-time policy enforcement by Gateway 1 2 3 4 Protected Applications AppGate Controller AppGate Gateway AppGate Client 2 Control Channel Encrypted, Tunneled Data Channel PKI Identity Management Policy Model Graphical Admin Console 1
  • 10. 4 3 SDP in Action 10 Controller uses PKI and IAM to establish trust Controller is an authentication point and policy store System is administered via graphical admin console Gateways protect cloud and network resources Application network traffic passes through Gateway Clients securely onboarded, authenticate to Controller, communicate with mutual TLS Clients access resources via Gateway • Mutual TLS tunnels for data • Real-time policy enforcement by Gateway Controller can enhance SIEM and IDS with detailed user activity logs Controller can query ITSM and other systems for context and attributes to be used in Policies 1 2 3 4 5 Protected Applications AppGate Controller AppGate Gateway AppGate Client 2 Integration with other IT and Security Systems 5 SIEM IDS ITSM Control Channel Encrypted, Tunneled Data Channel PKI Identity Management Policy Model Graphical Admin Console 1
  • 11. All users in ProjectX allowed SSH access to all virtual instances where Tag key equals SSH and value contains ProjectX, if client Anti-Virus has latest updates Controller ProjectX Device Posture Multifactor Authentication Network Location Contextual Attributes Enterprise Identity Auto-detect Cloud Changes Custom Attributes Time Endpoint Agents Application Permissions Descriptive Entitlements
  • 12. All users in ProjectX allowed SSH access to all virtual instances where Tag key equals SSH and value contains ProjectX, if client Anti-Virus has latest updates Controller Identity provider Y Client will authenticate to controller • Check for an Identity claim ProjectX • Launch a script to collect AV state • Send matching entitlements to client ProjectX Device Posture Multifactor Authentication Network Location Contextual Attributes Enterprise Identity Auto-detect Cloud Changes Custom Attributes Time Endpoint Agents Application Permissions 12 Descriptive Entitlements 1
  • 13. All users in ProjectX allowed SSH access to all virtual instances where Tag key equals SSH and value contains ProjectX, if client Anti-Virus has latest updates Controller Identity provider Y Client will authenticate to controller • Check for an Identity claim ProjectX • Launch a script to collect AV state • Send matching entitlements to client Client connects to Gateway • Brings the descriptive entitlement: • SSH access to AWS://tag:SSH=*ProjectX* ProjectX Device Posture Multifactor Authentication Network Location Contextual Attributes Enterprise Identity Auto-detect Cloud Changes Custom Attributes Time Endpoint Agents Application Permissions 13 Descriptive Entitlements 1 2
  • 14. All users in ProjectX allowed SSH access to all virtual instances where Tag key equals SSH and value contains ProjectX, if client Anti-Virus has latest updates Controller Cloud API Identity provider Y Client will authenticate to controller • Check for an Identity claim ProjectX • Launch a script to collect AV state • Send matching entitlements to client Client connects to Gateway • Brings the descriptive entitlement: • SSH access to AWS://tag:SSH=*ProjectX* Gateway connects to local cloud API • What are the instances that have a tag with Key SSH and Value containing ProjectX • Translate it to IP access rules ProjectX ProjectX2 Device Posture Multifactor Authentication Network Location Contextual Attributes Enterprise Identity Auto-detect Cloud Changes Custom Attributes Time Endpoint Agents Application Permissions 14 Descriptive Entitlements 1 2 3
  • 15. All users in ProjectX allowed SSH access to all virtual instances where Tag key equals SSH and value contains ProjectX, if client Anti-Virus has latest updates Controller Cloud API Identity provider Y Client will authenticate to controller • Check for an Identity claim ProjectX • Launch a script to collect AV state • Send matching entitlements to client Client connects to Gateway • Brings the descriptive entitlement: • SSH access to AWS://tag:SSH=*ProjectX* Gateway connects to local cloud API • What are the instances that have a tag with Key SSH and Value containing ProjectX • Translate it to IP access rules Detect changes • Update IP access rules again ProjectX ProjectX2 Device Posture Multifactor Authentication Network Location Contextual Attributes Enterprise Identity Auto-detect Cloud Changes Custom Attributes Time Endpoint Agents Application Permissions 15 Descriptive Entitlements 1 2 3 4
  • 16. Summary 16 Utilizes an authenticate first approach Removes attacks including zero day, DDOS and lateral movement The Cloud Fabric can now be extended all the way to the user and device Leverages legacy applications by extending the SDP Architecture No longer need traditional network defense equipment (Firewall, VLAN, VPN, etc.) • Identity-centric security • Policies on user and cloud instances Identity-Centric Network Security
  • 17. To Learn More View Why a Software-Defined Perimeter

Editor's Notes

  • #4: New slides
  • #5: Secure military networks Controller is the authentication point typically linked with one or more Identity providers Controller contains descriptive user access policies define access to applications Clients are securely onboarded All connections based on mutual TLS connectivity Traffic is securely tunneled from Client through Gateway to Protected Applications
  • #6: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications
  • #7: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications
  • #8: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications
  • #9: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications
  • #10: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications
  • #11: Bring Controllers online Integration with Identity, Multi-Factor and PKI services Bring Gateways online Create a mutual TLS connection with Controller after SPA Do not acknowledge Communication from any other host Do not respond to any non-provisioned request Gateways are now in “stealth mode” Bringing Clients online Create mutual TLS connection to Controller after SPA Authenticate to Controller List of authorized Gateways determined for this Client Controller could contact remote services for context Controller creates a list of Gateways Translate your descriptive network entitlements into IP access rules by talking to local cloud API’s. All other apps remain invisible Upload the network entitlements to the matching sites by launching a micro private firewall instance and build an encrypted data tunnel to each one Accept communication from Client Controller instructs Gateways to accept communication from this Client Receive list of IP’s of SDP Gateways Initiating host receives a list of IP’s to connect to Set up mutual TLS Tunnels to transfer data after SPA Client can now connect to the proper applications