Skip to main content

Services

Services are at the core of TRASAGATE's zero trust access solution. They represent the profiles of web applications, SSH servers, RDP servers, databases, and other resources that you want to secure and protect from unauthorized access.

TRASAGATE's services serve two primary purposes:

  1. Integration with TRASAGATE Identity Platform: By integrating your applications and services with TRASAGATE's identity platform, you can centralize access management and enforce consistent authentication and authorization policies across your entire IT ecosystem.

  2. Access Proxy Configuration: The configuration profiles of services in TRASAGATE are used by the access proxy to securely route incoming traffic to the appropriate backend services. This ensures that only authenticated and authorized users can access the resources they need, based on the policies you define.

When you create a service in TRASAGATE, you define its access policies, which specify:

  • Who can access the service (users, groups, roles)
  • What level of access they have (read, write, execute)
  • When they can access the service (time-based restrictions)
  • Where they can access the service from (location-based restrictions)
  • How they can access the service (device posture, multi-factor authentication requirements)

By mapping user access to integrated services using TRASAGATE's granular policies, you can enforce the principle of least privilege, ensuring that users only have access to the specific resources they need to perform their jobs.

TRASAGATE supports a wide range of service types, including:

  • Web Applications (HTTP/HTTPS)
  • SSH Servers
  • RDP Servers
  • Databases (MySQL, PostgreSQL, MongoDB, etc.)
  • Kubernetes Clusters
  • And more...

Whether you're securing access to a legacy application, a cloud-native service, or a critical database, TRASAGATE's flexible service profiles and robust access proxy ensure that your resources are protected by a comprehensive zero trust access solution.