Application Access
The Application Access policy provides clientless access to corporate applications for selected users and groups.
In this page, you can add new applications when you click + Add or the + thumbnail.
Creating Applications
When your site is configured, you can log in to your account through a designated URL of the form: https://REGION.connect.checkpoint.com/ACCOUNT. You also receive a confirmation email with a request to configure a password to your account.
You can work with the applications through the site or from the Harmony Connect Application Access page. Start to add applications and access permissions.
To create a new application:
-
Go to Policy > Access Control > Application Access and click the Add button.
-
In the Add New Application window, select the application type you want to add and fill in the resource details.
Application Access are available within these categories:
Changes apply immediately after you click the Launch button.
When the application is launched, users with permissions can access it either from the User App Portal or through a designated external address.
For the documentation on the User App Portal, see Harmony Connect Portal App User Guide.
Notes:
-
The User App Portal is supported on these operating systems:
-
Windows 10 or higher
-
macOS Big Sur
-
-
The User App Portal is supported only on the Chrome browser.
Configuring Access Permissions
The Access Permissions tab of each corporate application defines the security policy Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. for users and user groups that can access the corporate applications.
To configure access permissions to your new application:
-
Click the Edit Permissions button under the Access Permissions tab.
-
Select or clear the group checkbox to add or remove groups.
-
When you are done, click Save.
The changes apply immediately after you click Save.
Managing Application Objects
In addition, you can manage various objects, such as:
-
Managing Tags - to categorize resources by purpose, owner, or environment
-
Managing Remote Access Keys - to manage your SSH keys when configuring your SSH applications
-
Managing Groups - to allow users automatically inherit the groups access permissions to applications