5. Zero Trust Access (ZTA) - Add Applications
When utilizing Polaris' Zero Trust Access features, any added applications will be located under the Zero Trust Access tab under your organization.
ADD A NEW APPLICATION
Click Add Application to fill in the form, and click Add. You can set the duration in which the login session will last before requiring another login with your SSO.
Note: An application must have at least one Group and one Provider.
When viewing your application through your browser, you will now have a login screen to provision controlled access to your application. Only users added to your Zero Trust Access list, under the Users menu will be able to login to specific applications. This login screen is customizable under the Theme tab under the Zero Trust Access feature.
3. Zero Trust Access (ZTA) - Add Groups
GENERAL Creating Groups allows you to sort your users so that you don't have to individually add them to applications and can instead add them by roles or departments. All your groups will be shown under the Groups menu under Zero Trust Access. This ...
2. Zero Trust Access (ZTA) - Add Providers (SSO)
General Providers are 3rd parties that have authentication and authorization services such as Google or Microsoft. Most all organization emails belong to these 3rd parties so we can utilize those already existing logins for any applications that you ...
1. Zero Trust Access (ZTA) Overview
ZERO TRUST ACCESS Polaris Zero Trust Access (ZTA) feature is designed to provide more control over applications as users can provision a login system to existing applications so that all access is first verified and authorized. Essentially, in order ...
7. Zero Trust Access (ZTA) - Custom Access Domain
A part of the Zero Trust Access feature is allowing for a customized access domain so that authorized users can log into your zero trust applications. Within the Zero Trust settings, you'll find this option under the Configuration tab. Note: If ...
6. Zero Trust Access (ZTA) - Login Theme
The Login theme allows you to customize the look of your login page when using the Zero Trust Access feature. When users want to access your application, they will see this customized page from which they can then choose their sign-on method. To ...