1. Zero Trust Access (ZTA) Overview

1. Zero Trust Access (ZTA) Overview

ZERO TRUST ACCESS

Polaris Zero Trust Access (ZTA) feature is designed to provide more control over applications as users can provision a login system to existing applications so that all access is first verified and authorized. Essentially, in order to access an application, such as a dev website which may not be publicly facing, the ZTA feature adds a login function so that authorized users must first be authenticated. It adds an additional layer of security to any necessary applications. 

Enterprise customers are provided with 15 free ZTA users. Customers on other plans may upgrade to use this feature or purchase individual user seats. 

In order to add Zero Trust Access:
1. Choose the Provider you want for Single Sign On (SSO) services - Google or Microsoft Azure.
2. Create a Group to determine who will have access to the ZTA services (Users will then be listed under the Users tab)
3. Add your Application
4. Edit your theme, or configure your callback URL

ZTA Menu



  • Applications

    Application access is established by providers such as Google or Microsoft via Single-Sign On (SSO) so that all it takes is a click of a button for secure validation. The list of users who may have access to these applications is also established via the Zero Trust Access feature. This feature also supports subdomains and paths. To learn how to add applications to utilize the ZTA features, read more.
  • Providers

    ZTA uses 3rd-party providers to manage user authentication and authorization via SSO. These providers are pre-configured OAuth 2.0 applications so users only need OAuth credentials to set up a new provider. Currently, Polaris supports Azure Active Directory and Google Cloud Platform. Read more.
  • Groups

    Groups determine which users can access protected endpoints based on their organization roles or departments. It allows access to applications in mass without having to individually add users to certain applications. Groups are based on Email or Email Domain and customized by the Organization's admin for ZTA. Users will find it easy to add or remove people in your groups. Read more. 
  • Users

    In order to manage who accesses your applications, the users list serves to control who has permissions. Just because a user is added to your organization to view and manage the WAAP, does not automatically enroll them in the ZTA users list. Under the Users tab you can add, view, or revoke ZTA members anytime. Users are actually added to the ZTA list when you create your groups. Read more.
  • Login Page Configuration

    We made a simple and clean login page for users with an on-demand theme editor for customization to your organization. You can also preview your login page before saving any changes. Read more.
  • Custom Access Domain

    Currently, our domain polarisaccess.com is the default access point to your web application, where the login screen is maintained, but you absolutely can replace it with your own domain. Remember that you need to first change a few settings to use your custom access domain. Read more.





    • Related Articles

    • 3. Zero Trust Access (ZTA) - Add Groups

      GENERAL Creating Groups allows you to sort your users so that you don't have to individually add them to applications and can instead add them by roles or departments.  All your groups will be shown under the Groups menu under Zero Trust Access. This ...
    • 5. Zero Trust Access (ZTA) - Add Applications

      GENERAL When utilizing Polaris' Zero Trust Access features, any added applications will be located under the Zero Trust Access tab under your organization.  ADD A NEW APPLICATION Prerequisite Have at least 1 Provider and 1 Group  Click Add ...
    • 6. Zero Trust Access (ZTA) - Login Theme

      The Login theme allows you to customize the look of your login page when using the Zero Trust Access feature. When users want to access your application, they will see this customized page from which they can then choose their sign-on method. To ...
    • 7. Zero Trust Access (ZTA) - Custom Access Domain

      A part of the Zero Trust Access feature is allowing for a customized access domain so that authorized users can log into your zero trust applications. Within the Zero Trust settings, you'll find this option under the Configuration tab.    Note: If ...
    • 2. Zero Trust Access (ZTA) - Add Providers (SSO)

      General Providers are 3rd parties that have authentication and authorization services such as Google or Microsoft. Most all organization emails belong to these 3rd parties so we can utilize those already existing logins for any applications that you ...