Configure ZTNA for hosted resources with Azure container instances
In this topic, you will learn how to configure Portnox™ Zero Trust Network Access to allow your users to access your private web applications hosted in Microsoft Azure and accessible within an Azure private network, by using a Docker container in an Azure container instance.
In this scenario:
-
You want your on-premises and remote users to be able to access private web applications that are hosted in Azure.
-
You need to host a Portnox Docker container in Azure, for example, in Azure container instances, and in the same Azure virtual network as the hosted web applications.
We assume that you have already configured Azure, a virtual network in Azure, and that another container instance runs a web application, accessible via HTTP within your Azure local network.
We also assume that you already distributed certificates to your client devices.
Set up the ZTNA gateway in Portnox Cloud
In this section, you will set up a ZTNA gateway in Portnox Cloud, create a container instance in Azure, and run the Portnox ZTNA Docker container.
-
In the top menu of Portnox Cloud,
select the option. Then, on the Gateways screen, click on the + Create
gateway button.
-
On the Create gateway screen, enter a name for this gateway in the
Gateway friendly name field, and in the Region field, select
either US Node or EU Node. Then, click on the Create
gateway and generate Docker commands button.
-
In the Provision container step, click on the Copy
command link under the displayed Docker command to copy the command to the clipboard.
Then, save this command in a notepad. You will need it later.
-
Create an Azure container instance:
Set up the ZTNA resource in Portnox Cloud
In this section, you will set up a ZTNA resource in Portnox Cloud and configure it to access your private web application hosted in the same local network as the Docker container.
-
In the top menu of Portnox Cloud, select the Resources screen, click on the + Create
resource button.
option. Then, on the
-
In the Resource type step, select the Hosted
resource option, and then the Choose an existing gateway option. In the
Gateway field, select the gateway that you have just created. Then, click on the
Next button.
Note: The Resource Name must be a valid subdomain name, because the URL will be constructed using this name. You should only use lowercase letters, digits, and hyphens.
Result: If you want to use the Portnox URL, you can copy the URL for your resource by clicking on the ⧉ icon.
- Optional:
If you want to use a URL in your own domain for the resource:
-
In the IP, port and protocol section, enter the details of the hosted web application in the
IP Address, Port, and Protocol
fields.
Note: Use the IP address and port configured in your Azure instance that hosts your application. Ensure that the Docker container and the web application instance use the same Azure virtual network.Note: If you select HTTP in the Protocol field, to access it using ZTNA you still use HTTPS, not HTTP. For example, http://privateapp.vorlon.com or http://privateapp.us.portnox.com will not work.
- Optional: In the Enforcement step, change the setting to Override with custom policy and then select a risk assessment policy if you want to control access to this resource using a custom risk assessment policy.
- Click on the Add resource button to save your configuration.
Result: Your users can now access your private resource by typing the URL in the browser.
Configure the hosted application access control policy
In this section, you will configure the access control policy for groups that you want to have access to this hosted application.
-
In the Cloud portal top menu, click on the Groups option.
-
Select a group that you want to configure, click on the ⋮ icon at the end
of the row that represents the group, and then select the Group policies option.
Note: Repeat this step and the next steps for any other groups that you want to be able to access hosted applications.
- Scroll down to the ZTNA: HOSTED APPLICATION ACCESS section.
- Optional:
If needed, change the System Default Policy in the drop-down menu to another access control
policy.
The selected policy will be applied to any applications that are not specifically listed below.
Note: By default, the System Default Policy is configured to not allow access to hosted applications. If you need only limited access level control for your hosted applications, instead of selecting allowed applications for the group, you can select a policy that allows access to hosted applications or configure the System Default Policy to allow access. -
Add the applications that this group will be allowed to access: