Finally, get acquainted with how entitled applications can be hidden on your perimeter until the right context has been provided.
In order to reach them we have set up a few simple conditions.
REQUIRE MULTI-FACTOR AUTHENTICATION
Please make sure you have the Google Authenticater app installed on your mobile before continuing.
The privileged app hosted on the AWS cloud perimeter requires otp.
Try accessing now, AppGate SDP will verify a recent One Time Password was entered. Once you enter OTP, retry accessing the app.
You can also try to ping or ssh the hostname () to see that conditions works with any network protocol or legacy app.GO TO THE AWS APP
DEVICE POSTURE CHECKS
Note: this part is only available on if you are running a desktop client.
The privileged app hosted on the Google cloud perimeter requires a correct device posture.
In this example, access is only allowed when the firewall is turned on. If the condition is not met the client will show a message to you.
Try accessing now, if you have the firewall on you will be able to access. Otherwise, enable your firewall and retry accessing the app. It may take up to five minutes for changes to come in effect.GO TO THE GCP APP
EXTERNAL TICKETING SYSTEM INTEGRATION
We’ll try the third party system integration capabilities of AppGate SDP.
Try accessing the app now, your browser will timeout.
Imagine you need to open a support ticket to reach for your Azure Environment. We prepared a ticketing system called ServiceNow for this demo.
First login to ServiceNow using the same credentials from the welcome mail. Then click the "Incidents" then "New". All the important details are prefilled, so just type a simple description here and click submit.
Once you create the ticket, retry accessing the app. It may take up to two minutes for changes to come in effect.
Now resolve the ticket by pressing resolve button, and verify entitlement access is revoked.GO TO THE PRIVILEGED AZURE APP