Overview: Setting Up Resource Connectors and Connector Groups
- Define a connector group for each location (data center or network segment such as a branch office or security zone) that has private resources that users need to reach. For more information, see Add Resource Connector Groups.
- Obtain the resource connector image. You can use the same image for multiple connectors and for connectors in any connector group that uses the same environment. However, always use the most current image version. For more information, see Obtain the Connector Image.
- Deploy resource connectors in each location associated with a connector group, using a provisioning key that associates each connector with its group.
- For more information, see Deploy a Connector in AWS.
- For more information, see Deploy a Connector in Azure.
- For more information, see Deploy a Connector in VMware.
- For more information, see Deploy a Connector in Docker.
- Each deployed connector automatically reaches out to Secure Access after launch; confirm all connectors to ensure that they are legitimate and expected, and to make them ready to connect traffic. For more information, see Add Connectors to a Connector Group.
- Assign each private resource to a connector group whose connectors are deployed in the same data center, branch office, or security zone as the resource. For more information, see Assign Private Resources to a Connector Group.
- Test your connectors by accessing a private resource that is enabled for zero trust access from a remote user endpoint device that has Cisco Secure Client and is enrolled for zero trust access.
- As needed, at any time, add more connectors to provide additional throughput capacity. For more information, see Add Connectors to a Connector Group.
- As needed, associate additional and newly added private resources to the connector group. For more information, see Assign Private Resources to a Connector Group.