Setup overview

Use this workflow to get started with your Private Access service. This setup overview covers setting up Private Access, configuring private applications, and enabling remote access from your Cloud Security Gateway or standalone users.

Getting started with Private Access involves the following high-level steps.
  • Initial setup: configure administrators, check your site configuration, connect your hosting sites, configure an identity provider, and provision users and groups.
  • Private application access control: configure the applications that will be accessible to remote users, and define your private application access policy.
  • Configure remote access for users: enable remote users to connect to your private applications, using the Web Security Endpoint client. For Cloud Security Gateway, you must also enable proxy bypass rules.

Initial setup



  • Add administrators (if required)
  • Check and edit sites and connections
  • Connect application hosting sites
  • Configure an identity provider for SAML authentication
  • Import users and groups using SCIM

Private application access control



  • Define private applications
  • Create private application policy rules

Configure remote access for users



  • Create proxy bypass rules (Cloud Security Gateway only)
  • Deploy a supported version of endpoint
  • Install the Forcepoint root certificate

Testing

When you have completed the setup process, test that you can access your private applications from outside your corporate network.