Sep 22, 2022
•
Company
Supporting On-Demand Access with Twingate and Opal
Today, we’re excited to announce the new Twingate + Opal integration! Twingate replaces your legacy VPNs with a modern Zero Trust Network that’s easy to adopt and loved by your workforce.
Supporting fast growing companies, such as Blend, Chargebee, Hippo, and Bloomreach, Twingate helps companies move towards a Zero Trust architecture by tying every network event to an identity—user, device, and service—giving businesses modern control and visibility over activity across their entire network. It can be set up in less than 15 minutes and integrates with all major cloud providers and identity providers.
With the Twingate + Opal integration you can:
Allow users to request short-lived just-in-time access to infrastructure and applications from web and Slack
Delegate approvals and management to system owners and managers with the most context
Configure powerful governance policies for sensitive access
Automatically escalate and revoke privileged resource access based on on-call schedules e.g. PagerDuty or Opsgenie
Twingate and Opal: Better Together
Customers have leveraged Twingate and Opal together for a holistic zero-trust architecture both inside their network and across their applications and infrastructure. Zero trust is a powerful concept in network security where, by default, no access is given and no source is trusted. Implementing zero trust is challenging but when done correctly, it fortifies organizations against attack by limiting their attack surface.
Before Twingate, teams would manage multiple VPN solutions with inconsistent rules around who has access – resulting in a lack of transparency and consistency. Twingate enables companies to scale by simplifying network access controls with an easy deployment process that is seamlessly integrated with Okta and Terraform.
As with zero trust solutions, Opal implements the principles of limiting and continuously verifying access. Opal’s focus is managing resources outside the network layer, including developer infrastructure, identity provider groups and third-party SaaS roles. With Opal, employees are assumed by default to be unvetted. Access, for the most part, is not automatically granted and must be manually requested using Opal’s seamless workflows via web or Slack. Once granted, access is continuously re-certified, either because the access grant was short-lived or as part of periodic compliance reviews.
How to use Twingate and Opal
Install the Opal integration for Okta
Setup your Twingate Okta integration
Start granting just-in-time access!
Any questions? Feel free to reach out and we’re happy to schedule time for a demo!