Configuration Architecture

Get to know about the Configuration Elements in MicroZAccess.

Tenant: refers to the primary network or organization on which the entire Zero Trust Network Access (ZTNA) infrastructure is built. It represents a container that contains all the resources, users, and devices associated with a specific organization or network environment. Within a tenant, administrators can configure and manage various settings, access controls, security policies, and user permissions to ensure secure and controlled access to resources within the network.

  • Devices: refer to the physical or virtual endpoints, such as computers, laptops, servers, mobile devices, or IoT devices, that are registered to a specific tenant or organization. These devices are associated with the network infrastructure and are authorized to access resources within the network based on the defined policies and configurations defined under Endpoint Profile which serves as the primary device identity.

    • Endpoint Profiles are profile configurations of a specific registered device that can be created by administrators in MicroZAccess. An Endpoint Profile represents a specific set of network settings and access privileges assigned to a device. Each device registered in MicroZAccess can be configured with multiple network configurations known as Endpoint Profiles. These profiles are created and defined by the administrator based on the specific requirements of the organization.

      • MZA Overlay Server: is a component that facilitates secure communication between users/devices and protected resources. It also serves as an additional identity context for the Endpoint profiles. And within each Overlay server, MicroZAccess further enhances identity with:

        • Group Membership: refers to the user-defined groups within each overlay server. These groups are designed to organize and control access permissions within the network, providing a higher level of granularity and customization to the profile identities.

Security Groups: are collections of security principles and access policies that organizations use to manage and control access to resources within a network or system. They define access permissions, specify and filter sources based on their identity, and help protect resources by limiting access to authorized entities. Security Groups enforce security policies, provide identity-based filtering, and offer scalability and flexibility to adapt to changing security requirements. Overall, they are a crucial component of network and system security, ensuring controlled access and resource protection.

Last updated