Skip to main content

Functional Specification (Internal → External Access)

※ Last updated: 2026-04-02

This document is a functional specification for cases where secure access to external internet and SaaS services is provided within an internal work environment. Common management features such as user, group, license, conditional policies, and authentication settings areSecurity365 Management Center Functional Specification DocumentPlease refer to.


RFP Notation Standards

NotationMeaningDescription
RequiredCommon Evaluation CriteriaCommonly Required Features in the Web Isolation (RBI) Project RFP
specializationDifferentiation ItemsUnique feature of SHIELD Gate that provides an advantage over competitors —Recommendation to Add Evaluation Criteria to the RFP
SelectionAdditional ItemsFeatures offered optionally based on customer requirements

User Features

Major CategoryMid-categorySubcategoryDetailed DescriptionRFP notationspecifications
Isolated BrowsingWeb AccessIsolated Browser AccessIsolation browser access feature that executes web browsing on the server and streams only the screen to neutralize online threats.Requiredlink
URL input fieldProvide an input field where users can directly enter a URL to access.Requiredlink
URL Input Field Search Engine IntegrationA feature that automatically links to the search results page of the configured search engine (Google, Naver, Daum, Nate, Bing) when a search term that is not in URL format is entered in the URL input field.specializationlink
App AccessThe feature to access external SaaS through SHIELDGate and set user-specific access permissions.Requiredlink
Browser CompatibilityMulti-Browser SupportSupport features for major browsers such as Chrome, Edge, Firefox, and SafariRequiredlink
Support for advanced web featuresJavaScript interaction, WebGL 3D rendering, basic browser features such as translation, zooming, and right-clicking.Requiredlink
Fully Isolated ArchitectureDevice Isolation and Code/Data Blocking① There is no direct communication between the device browser and the corresponding web server, ② the web server's script and HTML code are not executed on the device, and ③ cookies, temporary files, etc. are not stored on the device at all, resulting in a completely isolated structure.specializationlink
HTTPS Single Port Secure CommunicationConnect to the RBI server using standard HTTPS (TCP 443) with a single port and single session without using UDP, and transmit 1:1 without relay servers like TURN — no need for separate firewall port openings or relay infrastructure, ensuring a security level equivalent to or higher than VPN for external access (such as IAP, etc.).specializationlink
High-Quality Screen StreamingAn intelligent screen transmission feature that prioritizes the transmission of keyframes immediately upon connection to ensure high quality from the initial screen, and automatically adjusts the resolution in case of network jitter to maintain responsiveness instead of interruptions.specializationlink
Security Plugin SupportEndpoint Broker TechnologyFunctionality that supports web applications requiring internal communication on PCs, such as banking security programs.specializationlink
Access PermissionsAccess Environment-Based PermissionsA feature that sets app usage permissions based on user location, device, and time conditions.Requiredlink
User Behavior ControlAccess ControlAccess Allow/DenyA feature that allows or blocks access to target URLs and categories based on conditional policies.Requiredlink
Additional AuthenticationAdditional identity verification feature through email verification code or OTP authentication when access is grantedRequiredlink
Behavior ControlKeyboard Input BlockingA feature that blocks keyboard input in the isolation browserRequiredlink
Site Navigation BlockageA feature that blocks page navigation to external domains.Selectionlink
URL Exposure ControlA feature that controls the visibility of the current access URL in the URL input field based on conditions.Selectionlink
Idle Screen LockA feature that switches to the lock screen after a set idle time to protect the data on the screen.Selectionlink
File Transfer ControlAllow/Block UploadsFeature to Allow or Block File Uploads in Isolated BrowserRequiredlink
Allow/Block DownloadsFeature to Allow or Block File Downloads in Isolated BrowserRequiredlink
Extension ControlFunction to control whether to allow file uploads and downloads by extensionRequiredlink
Transmission via the interconnection solutionFunctionality that supports file upload and download via an existing network connection solution operating in a network separation environment.specializationlink
Clipboard ControlBidirectional Clipboard ControlA feature that controls copy/paste direction between the isolated browser and the user PC.Requiredlink
Sensitive Information ControlSensitive Information Input BlockageFunction to detect personal information patterns in user input and block transmission (including generative AI services)specializationlink
Complete Logging of Generative AI Prompts and ResponsesA feature that allows for complete logging of input prompts and response content when using commercial generative AI.specializationlink
Print ControlPrint Allow/Block and WatermarkFunction to Allow or Block Printing in Isolated Browser — Watermark with User Identifiable Information May Be Applied When AllowedRequiredlink
Screen SecuritySecurity ScreenBlock/Guide ScreenA feature that displays a blocking notification screen when a policy is blocked, and provides a notification screen in case of technical issues such as connection errors or session termination.Requiredlink
Screen MarkingScreen MarkingFunction to display user identification information as a watermark on the screen (automatically inserted during screen capture as well)Requiredlink
File SecurityFile EncryptionEncryption Storage and Key ManagementFunction to encrypt and store files during upload and dispose of the encryption key upon file deletionRequiredlink
Extension ControlProcessing by ExtensionFunction to control uploads and downloads according to file extension blocking policyRequiredlink
Malware Scanning and DisinfectionMalware Scanning and CDRA feature that automatically applies malware scanning and CDR (Content Disarm and Reconstruction) processing during file upload and download.Requiredlink
Sensitive Information DetectionAutomatic Sensitive Information DetectionA feature that automatically detects personal information within files and blocks transmission.Requiredlink
Document Viewer IntegrationSHIELD Viewer IntegrationFeature to provide read-only preview through SHIELD Viewer when downloading filesRequiredlink
File ManagementStorage IntegrationExternal Storage and Edge ServerIntegration features for external storage such as NAS, OneDrive, Google Drive, and Edge server-based local storage.Selectionlink
Document EditingCollaborative EditingMS365·Google Docs·Hancom Web·S3/NAS-based document collaboration featuresSelectionlink
Read-Only ViewingRead-Only Document Viewing Functionality through SHIELD ViewerSelectionlink
Teams IntegrationTeams File IntegrationFeatures that support file viewing, uploading, editing, and team-based tab access within the Teams appSelectionlink
File SharingSharing and Permission ManagementURL link sharing, designating sharers, and permission settings, managing shared foldersSelectionlink
Exploration·Classification·CollaborationExploration and ClassificationFile and Folder Search, Tagging, Bookmarking, Pinning Important Items to the Top FeatureSelectionlink
Collaboration and HistoryDocument comment writing, file change notification subscription, viewing, editing, and downloading history confirmation featureSelectionlink
Deletion PolicyDeleted File ManagementA feature that automatically deletes files after retaining them for a certain period and allows setting the retention period for the file storage.Selectionlink
SaaS SupportSaaS CompatibilityMicrosoft 365Features supporting M365 services such as Teams, Office365, Word, PowerPoint, and SSORequiredlink
Video ConferenceSupport for audio, video, and screen sharing features of video conferencing platforms such as Teams and Zoom.Requiredlink
Video StreamingSupport for video streaming and playback of DRM-protected contentspecializationlink
InterfaceUI and MenuHide/Show Top BarA feature that hides or expands the top bar to support full-screen viewing and immersive browsing.Selectionlink
Home Menu and GNB ShortcutsSetting the Home Menu Usage and Displaying/Fixing Recently Accessed Apps and URLs in the GNBSelectionlink
Custom URL ButtonAdding a button to the top bar for calling external URLs and passing user information as parametersSelectionlink

Admin Features

Major CategoryMid-categorySubcategoryDetailed DescriptionRFP notationspecifications
Isolated Browser ControlAccess Control PolicyPolicy ManagementFunction to create, modify, delete, and manage the priority of access control policies for each member's work system.Requiredlink
Member and Condition SettingsFunction to designate the members subject to policy application and set conditions for location, time, and device.Requiredlink
Access to Business SystemFunction to individually set the accessibility of the app menu and URL input field menuRequiredlink
Maximum Tab Count LimitA feature that controls the maximum number of tabs that can be opened simultaneously in an isolated browser.Selectionlink
Session ManagementReal-time Session MonitoringA feature to view the resource status and tab information of all user sessions currently connected in real-time.Requiredlink
Session Force TerminationFunction to forcefully terminate the selected session immediately or with a delay — requires input for termination reason (mandatory), displays countdown warning on user screen, simultaneous termination of all tabs, and supports automatic saving of termination records.specializationlink
Access ControlApp and URL ManagementApp Access SettingsFunction to register apps accessible through SHIELDGate and set user-specific access permissions.Requiredlink
URL List · Group ManagementA feature that registers and manages target URLs for access control and groups them for use as a unit for policy application.Requiredlink
Manage Movable URLsFunction to register and control movable URLs in a specific SaaSSelectionlink
Web Category ManagementCategory View·Edit·RollbackFunction to check the category classification of the website and customize it or restore to default settings.Requiredlink
Connection Environment ControlRegistration of Access ConditionsA feature to register user access environment conditions (IP, device, time, etc.) and set app access permissions.Requiredlink
Conditional PolicyPolicy ManagementPolicy Creation, Modification, DeletionA feature that supports adding, editing, and deleting conditional policies, adjusting priorities, importing and exporting, and setting expiration dates.Requiredlink
Importing and Exporting PoliciesExport conditional policies as JSON (single) or ZIP (multiple) files, and the ability to import and register backup files.Selectionlink
Policy Application Status InquiryFunction to query policies that were actually applied (heating) and those that were not applied by period, sorted by the number of applications and the most recent application date — Excel download supportspecializationlink
Download Policy Status ExcelFeature to download all registered policies or search results as an Excel (.xlsx) file (provided separately from JSON backup)Selectionlink
Applicable targetsMember SettingsFunction to designate policy application members and separately set exclusion membersRequiredlink
Target Site SettingsFunction to select the target of policy application among the entire site, registered sites/groups, and web categories.Requiredlink
Connection ConditionsLocation, Time, Device ConditionsA feature that sets the policy application environment by combining location, time, and device conditions.Requiredlink
Access PolicyAccess Allow/Deny and Additional AuthenticationFunction to set URL access blocking or allowing and configure additional email and OTP authenticationRequiredlink
Behavior ControlKeyboard · Site Navigation · URL ExposureFunction to control keyboard input, block movement outside the domain, and set URL exposure based on conditions.Requiredlink
File Upload and Download ControlFunction to set whether file upload and download is allowed, along with conditions for file extensions and storage.Requiredlink
Clipboard · Screen LockFunction to control clipboard direction between the isolated browser and PC and set the idle lock screen.Requiredlink
Screen Marking · Printing WatermarkFunction to set whether to apply screen marking and print watermark by conditional policyRequiredlink
Context Menu ControlFunction to control the right-click menu of the RBI browser on an item-by-item ON/OFF basis for target areas (page background, text, links, images, videos, audio, input fields) — when an item is OFF, the associated shortcut keys are also blocked.specializationlink
Sensitive Information ControlSensitive Information Input BlockageFunction to detect personal information patterns in user input and block transmission (including generative AI services)specializationlink
Screen Security SettingsLock Screen SettingsImage and Message CustomizationFunction to customize the image and guidance message displayed on the lock screenSelectionlink
Guide Screen SettingsImage and Text CustomizationFunction to set images and guidance text for error screens such as system errors and session termination.Selectionlink
Screen Marking SettingsWatermark Design SettingsFunction to set display information for screen marking, including font, angle, spacing, and transparency, and provide real-time preview.Requiredlink
File Security PolicyFile Transfer PolicyExtension · Conditional ControlFunction to set differential file upload and download transfer policies by extension, user, and site.Requiredlink
Clipboard and Print Watermark ControlFunction to set clipboard directionality between PC and browser and apply print watermark.specializationlink
File ManagementStorage ManagementStorage and Edge Server ConfigurationFunction for integrating external storage and registering/managing Edge serversSelectionlink
Viewer and Permission PolicyDownload and Access Permission SettingsFunction to set viewing, editing, uploading, and downloading permissions by download repository policy and access path.Selectionlink
Authentication and IntegrationUser AuthenticationAuthentication IntegrationFunction to set up AD integrated authentication, SSO integration, OTP, and additional email authenticationRequiredlink
ProvisioningUser Automatic SynchronizationFunction to automatically synchronize users and groups by integrating with external systemsSelectionlink
User and Group ManagementAccount ManagementUser Registration and ManagementFunction to individually or batch register users and manage their activation status and passwordsRequiredlink
Group ManagementCreating Groups and Applying PoliciesFunction to create and manage units for organization and policy application groups and their membersRequiredlink
Admin SettingsRole-Based Access ControlSeparation of Administrator Roles and NotificationsFunction to refine administrator roles and provide notifications for key activitiesRequiredlink
License ManagementLicense AssignmentA feature that assigns licenses automatically or manually based on user activation status.Selectionlink
Account SecuritySetting Security PoliciesFunction to set account security policies such as password rules, change cycles, and automatic logout.Requiredlink
System Operation SettingsMenu · PAC · Button SettingsFunction to configure the operating environment, such as menu display options, PAC file distribution, custom URL buttons, etc.Selectionlink
Logs and MonitoringLog InquirySystem LogFunction to query user and administrator activity logs and support backup, archiving, and integrity verification.Requiredlink
Generative AI Usage LogLogging the entire content of queries (Input) and responses (Output) from major generative AI services such as ChatGPT, Claude, Gemini, Grok, and Perplexity, with the ability to filter and view based on AI service, user, duration, and conversation content — this can be used to understand AI usage status by user and for auditing information leaks within the company, with support for downloading in CSV format.specializationlink
Log Storage and IntegrationLong-term Storage and SIEM TransmissionStore user logs for more than 1 year according to administrator settings, and provide proof of tampering prevention through backups and transmission to SIEM (Security Information and Event Management).specializationlink
Access MonitoringConnection Status DashboardA feature that provides the status of website access and the operation status of the real-time isolation browser on a dashboard.Requiredlink
Connection Quality and Error ManagementA feature that measures user-side connection speed and provides an interface for reporting errors.Selectionlink
System MonitoringNode MonitoringMonitoring system resource usage per node in an On-Premise environmentSelectionlink