Configuration by use case
Configuration steps vary depending on what type of deployment you are implementing.
For a detailed discussion of deployment considerations and best practices in designing your architecture, see the Deployment Guide. The following sections describe the configuration steps for the most common use cases:
Next steps
After you complete the above configuration settings, the following steps are similar for all use cases:
-
Configure sites and agents to define the target applications you want protected. Sites might need site authenticators to define the credentials the site expects for access control.
-
Configure applications and resources to define the assets you want to allow clients to access.
-
Create policies for the defined applications and resources to protect them.