Published services in Cloud Secure Edge (CSE) allow for granular definition and assignment of access to private resources, in a least-privileged manner. In this approach, private resources are cloaked and “published” on the internet via public DNS. The published service is set up to route to CSE’s Edge for policy enforcement. This approach allows for seamless access by authorized users and devices, but it protects against access from non-authorized users.
CSE categorizes private resources into Hosted Websites and Infrastructure services. Each type of service uses a different state-of-the cryptographic technique to provide one-click connectivity combined with zero-trust security.
| CSE Service Type | Description of Corporate Resource | Cryptographic Technique |
|---|---|---|
| Hosted Websites | Web applications hosted on corporate servers, typically single-tenant | OIDC JWT token |
| Infrastructure | Linux servers, Windows servers, databases, etc. | MTLS & SSH certificates |
CSE uses OpenID Connect (OIDC) authentication flows to provide your end users secure zero-trust access to Hosted websites via web browsers. CSE uses Mutually Authenticated TLS (MTLS) flows to provide your end users secure zero-trust access to Infrastructure services. CSE's security mechanisms are designed to be completely transparent to both the user and the service it is securing.
You may use just one or all the types of services in your environment, depending on the use cases in your organization. Some common scenarios for each service type are listed below, along with the request flow diagram that explains how the Zero Trust security mechanism works.
Hosted Websites can be accessed by your end users directly from any browser without needing to turn on their VPN client, or any other type of agent. CSE leverages the OpenID Connect protocol and HTTP headers (typically cookies) to transparently insert a JWT token into every request. Client access is then integrated with your organization's Single Sign On provider, and continuously authorized based on the security posture of the device and user.
You can publish Hosted Website services when you need to enable:
Infrastructure services enable one-click, secure access to development and production environments. Traditionally, infrastructure access has relied on a combination of network access via a VPN and service-specific authentication protocols that use long-lived credentials such as passwords or SSH key-pairs. Long-lived credentials can be a security nightmare, given the ease with which they can be shared or lost. CSE transparently upgrades infrastructure service traffic to Mutual-Auth TLS using short-lived X509 certificates. Security policies can then be continuously enforced, locking down access to specific servers based on user and device attributes and trust levels.
You can publish Infrastructure services when you need to enable:
Read about how to register domains to publish services for secure access for your internal resources.