Procedure
Before you begin
- Full Admin user role. For more information, see Manage Accounts.
Procedure
1 |
Deploy network connectors in Secure Access.
|
2 |
Provision users and groups in Secure Access. For more information, see Manage Users and Groups. |
3 |
Configure SAML integrations with identity providers (IdPs). For more information, see Configure Integrations with SAML Identity Providers. |
4 |
Create Zero Trust (ZT) posture profiles for the user devices in the organization. For more information, see Manage Zero Trust Access Posture Profile. |
5 |
Provide Secure Access private resource URLs to users on unmanaged devices. |
6 |
Create a policy rule or add an ZT posture profile to an existing Secure Access rule. For more information, see Manage the Access Policy. |
What to do next
- Check that you can reach private resources protected by Secure Access.