Skip to main content

Access Control Service


1) Development Background


Proxy Relay Serviceis existingReplacing VPNIt has been developed as a zero trust-based security solution that can be implemented.Without an agentIt is a service that mediates requests so that external users can safely access internal company resources.

on the cloudSHIELDGateIt safely mediates access requests from external sources to internal systems, providing a safer and more flexible internal system access environment.


2) What is a relay proxy service?


**Proxy Relay Service** is a service that safely relays requests to allow external users to access internal business systems (such as legacy systems).

SHIELDGateIt handles access requests from outside to inside in conjunction with __PH_0__, safely exposing internal systems to the outside and relaying access.

Main Features

  • Proxying Access Requests from External to Internal Systems
  • Safely Exposing Internal Work Systems to the Outside
  • **RBI(Remote Browser Isolation)**Support for external access screen isolation based on
  • Internal IP Protection and Masking
  • Logging and Monitoring of Access Requests

3) Configuration Diagram


1

Proxy Relay Service

  • Safely relay external user access requests to internal systems
  • Publicizing internal work systems to the outside
  • Validation and Filtering of Access Requests
  • Ensuring Secure Communication with Internal Systems

4) Processing Flow


Example: External User -> Internal Business System Access Process

stepDescription
1external userSHIELDGatePerform login and authentication through __PH_0__
2After authentication is complete**Remote Browser(RBI)**Access
3️RBI internal network address and access requestProxy Relay Serviceto 전달
4️Proxy Relay ServiceValidates the access request and relays it to the internal system.
5️Mapping external addresses to internal addressesInternal Work Systemaccess
6️request isInternal Work Systemdelivered safely
7️The entire process isBrowser-based, no separate agent installation required
8️Logging and monitoring of access requests