Skip to main content

Access Control

Access Control Overview

This section, along with Access Policy are designed to control the access of users to the ZTNA servers and gateways that are setup through the Tunnels section.

This is done by creating Access control policies that, by default BLOCK all access other than the users specified in the Access Control (if no Policy is applied), or for more advanced control, apply an Access Policy.

image.png

Listed below is a description of the menus:

SearchAllows for filtering of the different Access Control rules based on a variety of different fields
Priority ChangeChanges the priority in which control rules apply to users, with those at the top of the list having higher priorities overriding those later
CheckboxUsed in conjunction with the delete button in order to delete one or multiple selected rules
CreateOpens the create menu in order to create a new access control rule
EditAllows for the editing of the specified rule, opening up the “create” menu prefilled with the access controls current information

Configuring Access Control

The Access Control menu allows the user to create rules that allow/restrict access to internal web applications.

image.png

image.png

Step 1: Navigate to the menu

Navigate to ZTNA > Access Control and click Create. Once there, the Create Access Control menu will be visible. Listed below is a description of the menus:

ActivateUsed to enable or disable the rule
Name (Unique)A unique name to define the rule
PolicyApply an Access Policy to the rule, if left blank will apply “Allow” to all Users added to the User field at the bottom of the form, and “Block” all other access
Device PostureThis will check to ensure that the machine passes the specified Posture check, setup in the AIConnector menu.
TypeThe type of connection for this Access Control rule including HTTPS/HTTP/TCP/UDP/ICMP
ApplicationEnter the SA domain of the server created in the Tunnel menu and the port number of the server.
Redirect URIEnter the address to which you will be redirected when trying to access the specified application. This can only be entered when HTTP/HTTPS is selected for Type
Block PageThe “Block Page” that will be displayed to the user, setup in the Settings → Block Page menu option
UserThe list of users that this Access Control will target. All users not specified will be blocked by default.
RBIThe function allows for RBI to be added to the access control policy for the domain in the rule. The policy can be further modified with allow/block for Download, upload, clipboard, printing, and watermark

Step 2: Enter Web Application

When entering the Secure Access Domain of the application, ensure it is the name SA Domain created in the tunnel menu.

image.png

entering the SA Domain from the server tunnel

image.png

the server tunnel for reference

If TCP/UDP/ICMP is selected for Type, the SA domain cannot be entered, and IP/CIDR/PORT information must be entered instead.

image.png

Step 3: Set Users

In ZTNA, setting the users/user groups is very important. When establishing a tunnel, it operates on the Zero-Trust principle. This means in practice that no user has access unless explicitly given access via Access Control.

image.png

As a best-practice, by establishing user groups, it will be easier to properly give access to applications without needing to micromanage individual users. When using access policy rules, if both access control rules and access policy rules specify users, the user list defined in access control must include the users specified in the access policy rules for the access policy rules to function correctly. This is due to the logic that all users not specified in the Access Control are blocked by default.

Step 4: Apply and Test

After clicking apply, to access the web server one must first connect to the workspace via the AIConnector.

image.png

After doing so, and ensuring that the user logged in to the AIConnector has been given access to the web application, it will now be accessible.

image.png

ztna.web.test is now accessible

To show a negative test in action, simply disconnect from the AIConnector, and attempt to access the application.

image.png

This will show if attempting to access internal resources without the use of the AIConnector.

Finally, test whether a user connected via the AIConnector without explicit access can access the application.

image.png

attempting to connect as a user without access