{"id":48760,"date":"2020-12-16T07:00:00","date_gmt":"2020-12-16T12:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=48760"},"modified":"2024-02-02T13:28:56","modified_gmt":"2024-02-02T18:28:56","slug":"zero-trust-conditional-access","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/zero-trust-conditional-access","title":{"rendered":"Get Zero Trust Ready with 黑料海角91入口 Conditional Access"},"content":{"rendered":"\n

As the world moves to remote work, the perimeter of security has drastically changed. More and more employees are relying on home networks or personal devices to connect to corporate resources. People are now accessing resources from any device and from anywhere outside of their corporate domain. This activity has given rise to the domainless enterprise<\/a>\u2014a central cloud directory service, which serves as the hub for securely connecting users and their devices to the IT resources they need to accomplish their jobs. <\/p>\n\n\n\n

As we evolve  how we work, we also need to change how we secure the IT environment. Zero Trust<\/a> is the concept of \u201ctrust nothing, verify everything,\u201d and it fundamentally shifts how security is implemented in an organization. With a Zero Trust model, access is granted when:<\/p>\n\n\n\n

    \n
  1. The user is verified based on their identity.<\/li>\n\n\n\n
  2. The device that they\u2019re using is known to the organization and, thus, deemed safe and secure.<\/li>\n\n\n\n
  3. The network they\u2019re accessing resources from is known, and is verified as safe and secure.<\/li>\n<\/ol>\n\n\n\n

    The process of continuous verification can be complex and time-consuming. <\/p>\n\n\n\n

    Using Conditional Access to Enable Zero Trust<\/h3>\n\n\n\n

    With the release of Conditional Access<\/a>, 黑料海角91入口 customers now have an easier path to implement the core foundations of a Zero Trust model. By managing identities, networks, and devices all from a single cloud directory platform, 黑料海角91入口 empowers admins to verify three key access points: a user’s identity, the network they\u2019re on, the device they\u2019re using. By establishing trust of these key elements, IT admins can then establish flexible verification rules through 黑料海角91入口\u2019s new Conditional Access Policies:<\/p>\n\n\n\n