Fortinet black logo

Introduction

7.2.1
Copy Link
Copy Doc ID 49ee198e-0f5e-11ed-9eba-fa163e15d75b:346917
Download PDF

Introduction

Zero trust network access (ZTNA) is an access control method that uses client device identification, authentication, and zero trust tags to provide role-based application access. It gives administrators the flexibility to manage network access for on-net local users and off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context based posture checks using zero trust tags.

This document provides reference information for ZTNA.

Introduction

Zero trust network access (ZTNA) is an access control method that uses client device identification, authentication, and zero trust tags to provide role-based application access. It gives administrators the flexibility to manage network access for on-net local users and off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context based posture checks using zero trust tags.

This document provides reference information for ZTNA.