Quick start steps with Zero Trust Network Access
In this topic, you will learn the steps you need to take to configure the Portnox™ Zero Trust Network Access service.
If you already completed some of the steps, proceed to the next steps.
-
Create a Portnox Cloud tenant to access the service.
In this step, you create an account with Portnox Cloud and your own tenant. You only need to do this once.
-
Log in to Portnox Cloud to start working with the service.
In this step, you access the tenant that you created earlier. You must complete this step every time you want to work with Portnox Cloud.
-
Configure your cloud-based authentication repository in Portnox Cloud.
For example:
-
Configure Microsoft Entra ID (Azure Active Directory) as your authentication repository.
-
Configure Google Workspace as your authentication repository.
-
Configure Okta Workforce Identity as your authentication repository.
-
Configure local Active Directory as your authentication repository.
-
Alternatively, manage your accounts internally within Portnox Cloud with Cloud accounts.
-
-
Configure access to SSO web applications (previously known as Conditional Access for Applications, CAA):
Note: You need to complete these steps only if you will be using Zero Trust Network Access to secure access to SSO web applications. If you will be using Zero Trust Network Access to secure access only to hosted resources, skip this step.
-
Configure access to hosted resources (previously known as Remote Private Access, RPA):
Note: You need to complete these steps only if you will be using Zero Trust Network Access to secure access to hosted resources. If you will be using Zero Trust Network Access to secure access only to SSO web applications, skip this step.
Create the Zero Trust Network Access gateway, run the Zero Trust Network Access Docker container, and add resources.
-
If you host your private resources on-premises and want to use a Linux machine as a gateway, configure a Linux-based Docker container.
-
If you host your private resources on-premises and want to use a Windows machine as a gateway, configure a Windows-based Docker container.
-
- Optional:
Install AgentP on user devices or ask users to install AgentP on their devices.
Note: Zero Trust Network Access needs a user certificate on the device to be able to authenticate with the resource. You can either get such a certificate by installing AgentP on the device, or by using an Intune/Jamf agent already on the device and configuring Intune/Jamf to work with the Portnox SCEP server.
-
If you want users to install AgentP, send them the following link: https://docs.portnox.com/byod/. These are end-user instructions for all popular desktop/mobile operating systems: Windows, macOS, iOS, and Android. They teach the users how to install AgentP.
-
If you want to automatically distribute AgentP to user devices, here are some guides for popular endpoint management systems:
Note: If you choose this option, skip the next step. -
- Optional:
If you use Microsoft Intune or Jamf in your organization and you don’t want to use AgentP:
Note: If you choose this option, skip the previous step.
-
Configure groups, policies, and more.
Once you have Zero Trust Network Access working, you can now adjust it specifically to your needs.