Fortinet white logo
Fortinet white logo
7.6.0

Introduction

Introduction

Zero trust network access (ZTNA) is an access control method that uses client device identification, authentication, and security posture tags to provide role-based application access. It gives administrators the flexibility to manage network access for on-net local users and off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context based posture checks using security posture tags. Furthermore, security posture tags can be used in VPN connections for enforcement before tunnel establishments.

This document provides references to ZTNA-related information such as security posture tags, CASB applications, and error codes.

Introduction

Introduction

Zero trust network access (ZTNA) is an access control method that uses client device identification, authentication, and security posture tags to provide role-based application access. It gives administrators the flexibility to manage network access for on-net local users and off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context based posture checks using security posture tags. Furthermore, security posture tags can be used in VPN connections for enforcement before tunnel establishments.

This document provides references to ZTNA-related information such as security posture tags, CASB applications, and error codes.