Comparison of Client-Based and Browser-Based Zero Trust Access Connections
You can configure up to two ways for users to connect to private resources using Zero Trust Access:
Client-based connections:
- The Cisco Secure Client is installed on the end-user device.
- Users can access resources using any protocol.
- Users access using the internal resource address you specify in the Private Resource.
- The client-based posture profile offers more options for controlling endpoint (device) requirements than the browser-based posture profile offers.
- You can block access to specified subdomains when the resource address for client-based connections is configured as a wildcard FQDN. See Using Wildcards to Configure Traffic Steering for Private Destinations.
- If traffic is blocked, the user sees a Block page if all requirements are met.
See Block pages for Private Resources.
Browser-based connections:
- Access does not require a client installed on the user endpoint device.
- Use this option to allow access from devices with an operating system that the client does not support.
- You can enable this option for private resources to allow connections from users who do not have managed devices, such as contractors, vendors, and others with bring-your-own (BYOD) devices, and from devices that do not have a client. You do not need to install anything on such devices.
- Access is solely via browser.
- Users access private resources using a dummy URL that does not expose your actual resource address. Secure Access redirects browser-based traffic to the actual resource if access rules allow the traffic.
- You can specify endpoint (device) requirements for these connections, but fewer than in the client-based posture profile.
- If traffic is blocked, the user sees only a standard browser error. This prevents bad actors from obtaining information about your resources.
- Users who have the client installed can always access a resource using the clientless browser-based URL if your access rules allow them access.
Comparison of Zero Trust Access and VPN< Comparison of Client-Based and Browser-Based Zero Trust Connections > Network Authentication for Zero Trust Access
Updated 4 months ago