Quick start steps with Zero Trust Network Access
In this topic, you will learn the steps you need to take to configure the Portnox™ Zero Trust Network Access service.
If you already completed some of the steps, proceed to the next steps.
-
Create a Portnox Cloud tenant to access the service.
In this step, you create an account with Portnox Cloud and your own tenant. You only need to do this once.
-
Log in to Portnox Cloud to start working with the service.
In this step, you access the tenant that you created earlier. You must complete this step every time you want to work with Portnox Cloud.
-
Integrate Portnox Cloud with directory services to authenticate users (select options below).
In this step, you connect Portnox Cloud to your existing directory services. Cloud checks these directories when users/devices want to connect to your ZTNA resources.
-
Configure Microsoft Entra ID as your authentication repository.
-
Configure Google Workspace as your authentication repository.
-
Configure Okta Workforce Identity as your authentication repository.
Note:If you will be using Zero Trust Network Access for hosted resources only, and not for Web-based SSO applications, you can also use it with Active Directory, OpenLDAP, or Portnox accounts. -
-
Configure access to SSO web applications:
Note:You need to complete these steps only if you will be using Zero Trust Network Access to secure access to SSO web applications. If you will be using Zero Trust Network Access to secure access only to hosted resources, skip this step.
-
Configure an identity provider.
The identity provider is a web app, often configured in your authentication repository, that checks the identity of users of web applications. You should set up an identity provider that can work with the authentication repository you set up earlier in this process.
-
Configure applications to use ZTNA.
For each web application, the setup steps are different. We have a collection of guides for well-known web applications. However, if your application is not on the list, look at your application’s administrative guide. Search for topics like SAML integration.
-
Configure an identity provider.
-
Configure access to hosted resources:
Note:You need to complete these steps only if you will be using Zero Trust Network Access to secure access to hosted resources. If you will be using Zero Trust Network Access to secure access only to SSO web applications, skip this step.
Create the Zero Trust Network Access gateway, run the Zero Trust Network Access Docker container, and add resources.
-
If you host your private resources on-premises and want to use a Linux machine as a gateway, configure a Linux-based Docker container.
-
If you host your private resources on-premises and want to use a Windows machine as a gateway, configure a Windows-based Docker container.
-
- Optional:
Install AgentP on user devices or ask users to install AgentP on their devices.
Note:Zero Trust Network Access needs a user certificate on the device to be able to authenticate with the resource. You can either get such a certificate by installing AgentP on the device, or by using an Intune/Jamf agent already on the device and configuring Intune/Jamf to work with the Portnox SCEP server.
-
If you want users to install AgentP, send them the following link: https://docs.portnox.com/byod/. These are end-user instructions for all popular desktop/mobile operating systems: Windows, macOS, iOS, and Android. They teach the users how to install AgentP.
-
If you want to automatically distribute AgentP to user devices, here are some guides for popular endpoint management systems:
Note:If you choose this option, skip the next step. -
- Optional:
If you use Microsoft Intune or Jamf in your organization and you don’t want to use AgentP:
-
Integrate Portnox Cloud with Intune or Jamf.
Here are the relevant guides:
-
Configure Intune or Jamf so that the devices request SCEP certificates from Portnox Cloud.
Here are some guides for different operating systems:
Note:If you choose this option, skip the previous step. -
Integrate Portnox Cloud with Intune or Jamf.
-
Configure groups, policies, and more.
Once you have Zero Trust Network Access working, you can now adjust it specifically to your needs.
-
Manage groups of application users.
Groups allow you to set different access policies for different users. For example, you can allow only your developers to access your development applications, and only your finance department to access your finance applications. If you choose to control this access at the application-level, you can create one group for all users.
Note:By default, your Portnox Cloud portal has one group called Default, which contains all your users that are not specifically assigned to any other groups. -
Configure risk assessment policies and assign them to groups.
Risk assessment policies help you check if a user’s device is secure enough to access applications. You can give different importance to various conditions, like not having antivirus software or using an old version of the operating system. If the total score exceeds a certain limit, you can consider the device as unsafe.
Note:By default, your Portnox Cloud portal has one risk assessment policy called System Default Policy, which is set up with recommended security measures for all operating systems, and which is assigned to the Default group. -
Configure access control policies for applications and assign them to groups.
An access control policy for an application decides what to do if the risk assessment policy labels the device as unsafe. You can choose to let unsafe devices use your applications, or you can tell the user what they should do to make their device safe.
Note:By default, your Portnox Cloud portal has one access control policy called System Default Policy, which is set up to deny access to unsafe devices, and which is assigned to the Default group.
-
Manage groups of application users.
