Access Control Service
1) Development Background
Proxy Relay Serviceis existingReplacing VPNIt has been developed as a zero trust-based security solution that can be implemented.Without an agentIt is a service that mediates requests so that external users can safely access internal company resources.
on the cloudSHIELDGateIt safely mediates access requests from external sources to internal systems, providing a safer and more flexible internal system access environment.
2) What is a relay proxy service?
**Proxy Relay Service** is a service that safely relays requests to allow external users to access internal business systems (such as legacy systems).
SHIELDGateIt handles access requests from outside to inside in conjunction with __PH_0__, safely exposing internal systems to the outside and relaying access.
Main Features
- Proxying Access Requests from External to Internal Systems
- Safely Exposing Internal Work Systems to the Outside
- **RBI(Remote Browser Isolation)**Support for external access screen isolation based on
- Internal IP Protection and Masking
- Logging and Monitoring of Access Requests
3) Configuration Diagram
Proxy Relay Service
- Safely relay external user access requests to internal systems
- Publicizing internal work systems to the outside
- Validation and Filtering of Access Requests
- Ensuring Secure Communication with Internal Systems
4) Processing Flow
Example: External User -> Internal Business System Access Process
| step | Description |
|---|---|
| 1 | external userSHIELDGatePerform login and authentication through __PH_0__ |
| 2 | After authentication is complete**Remote Browser(RBI)**Access |
| 3️ | RBI internal network address and access requestProxy Relay Serviceto 전달 |
| 4️ | Proxy Relay ServiceValidates the access request and relays it to the internal system. |
| 5️ | Mapping external addresses to internal addressesInternal Work Systemaccess |
| 6️ | request isInternal Work Systemdelivered safely |
| 7️ | The entire process isBrowser-based, no separate agent installation required |
| 8️ | Logging and monitoring of access requests |