Skip to main content

1. Access Guide for Work System

Getting Started

SHIELDGate isIsolated BrowserIt is a security solution that allows safe access to the business system and the internet through __PH_0__.

There are two ways to connect.

  1. App Click→ Select and access the registered app.
  2. Enter URL→ Access by entering the address directly

Accessing via the app

Choose an app

  1. After logging into SHIELDGate, the app list will appear.
  2. the desired appClickYou will be connected immediately.
  3. The SHIELDGate menu appears at the top.

Check App Information

You can check the following information in each app:

InformationDescription
App NameApp Name
Representative URLThe default access address of the app

Directly accessing via URL

How to enter a URL

  1. Enter the address in the top URL input field.
  2. example.comorhttps://www.example.comIt can be entered in the form of __PH_0__.
  3. EnterPressing the key will connect.

💡 When the policy selection screen appears

When the entered URL corresponds to multiple policies,Which policy to connect withYou can choose.

Selection options:

  • App PolicyApplying security policies for registered apps
  • Direct access to URL: Apply URL-specific security policy

Differences by policy:

  • File Upload/Download Permissions
  • Range of possible movement to other sites
  • Clipboard usage permission
  • Scope of Repository Usage

💡 TipHovering over the information icon (ⓘ) will allow you to view the detailed information for each policy.


Security Authentication

Connection Environment Verification

If the administrator has set a security policy, the following conditions must be met for access to be granted:

  • Allowed IP addressesConnect from
  • Allowed time zoneAccessing __PH_0__
  • Allowed countriesAccess from
  • Registered DevicesAccess via __PH_0__

Reference: The above conditions apply only if set by the administrator.

**What if the connection is blocked?**Please contact the administrator for connection environment settings.

Additional Authentication (MFA)

Additional authentication may be required when accessing a specific site or during login.

Three methods of authentication:

MethodProcedureTime limit
EmailEnter the code received via email.5 minutes
OTPEnter the 6-digit code generated by authentication apps such as Google Authenticator or Microsoft Authenticator.-

OTP authentication detailed procedure:

  1. During initial setupScan the QR code with the authentication app to register.
  2. Storage of recovery keyStore the recovery key provided with the QR code in a safe place.
  3. Daily UseEnter the 6-digit code verified from the authentication app.

💡 TipYou can use authentication apps such as Google Authenticator, Microsoft Authenticator, Authy, etc.

⚠️ When authentication failsAccess is blocked with the message "Authentication has failed."


Usage Rights and Restrictions

The use of the following features may be restricted according to the policies set by the administrator.

Keyboard input

  • Allow: Normal typing possible
  • BlockDisplay the message "Input via keyboard is prohibited due to policy."
  • Allow: Move freely to all sites
  • Block: Can only navigate to the specified site.
    • When accessing a blocked site → "This action is prohibited by policy" page displayed

File Management

File Upload

  • Only allowed file formats can be uploaded.
  • Select save location:
    • My PC file folder: Use local PC files
    • SHIELDGate file folder: Using Cloud Storage

File Download

  • Only allowed file formats can be downloaded.
  • Select save location:
    • My PC: Save directly to PC
    • SHIELDGate file folder: Save to cloud
    • SHIELDViewer: Selective download after previewing with a secure viewer

⚠️ When using SHIELDrive storage: It must be allocated to the corresponding storage to be available.

Clipboard (Copy/Paste)

Directional Control:

  • Isolated Browser → PC: Copy browser content to PC
  • PC → Isolated Browser: Paste PC content into the browser

⚠️ When limitedDisplay the message "Clipboard usage is prohibited by policy."


Additional security features

Screen Lock

If you do not work for a certain period of time, the session will automatically expire.

Screen marking (watermark)

A watermark containing user information will be displayed on the screen.

**Purpose:**User tracking possible during screen capture.

Video Conference Mode

A special mode is applied in the business system for video conferencing.

  • Apply settings for optimizing video conference performance.

Top Toolbar Functions

View and Copy URL

When you access the business system, you can check and copy the URL of the currently connected site from the top toolbar.

Displayed information:

  • Current access URL: The address of the webpage you are currently viewing
  • Copy button: Copy URL to clipboard

How to use:

  1. Check the current URL in the top toolbar.
  2. Copy the URL to the clipboard by clicking the copy button.
  3. You can paste the copied URL elsewhere.

💡 ReferenceThe URL display feature may not be visible depending on the administrator settings.

Hide/Show Top Bar

This feature allows you to hide or expand the top toolbar to improve work concentration.

How to use:

  1. Hide top bar

    • on the right side of the top toolbarHide iconClick
    • The top bar slides up and is hidden.
    • Web content is displayed in full screen.
  2. Expand top bar

    • in a hidden stateMouse hover over the top area of the screen
    • The top bar appears temporarily.
    • Expand iconClicking will fix the top bar.
    • It will be hidden again when the mouse is moved away (if not clicked).

Custom Button

If set by the administrator, in the top toolbarCustom ButtonThis may be displayed.

How to use:

  1. Click the corresponding button in the top toolbar.
  2. The linked page opens in a new window or tab.
  3. Perform the necessary tasks

Problem Solving

Connection issue

When unable to connect

  1. Check IP address, time, and device settings.
  2. Inquiry about the access environment to the administrator

MFA authentication failed

  1. Check the time limit for the authentication code (Email: 5 minutes)
  2. Network Connection Status Check
  3. Contact the administrator in case of persistent issues.

Function usage issue

When the top bar disappears and cannot be found

  1. Hover your mouse at the very top of the screen.
  2. Click the expand icon when the top bar appears temporarily.
  3. The top bar is fixed and will always be displayed.

When the URL is not visible

  1. Check if the top bar is hidden (hover the mouse over the top of the screen)
  2. The administrator may have disabled the URL viewing feature.
  3. Request the administrator to enable the feature if necessary.

When file upload/download is not possible

  1. Check if the file extension is an allowed format.
  2. Check storage allocation status
  3. Network Connection Status Check

When the clipboard cannot be used

  1. Check if the direction is allowed in the policy.
  2. Request permission from the administrator if necessary.

💡 HelpIf the issue is not resolved by this guide, please contact the administrator.