Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Add Applications

icons.png

Add applications to an application group to logically organize multiple applications as a single entity. Intended users can access these applications based on rules defined in private access policies.

Private Access addresses key use cases traditionally handled by VPNs through Network Level Access, which securely enables broad network connectivity based on zero trust principles. This approach allows seamless migration from legacy VPN solutions.

Enhance private access by enabling users to assign multiple application groups (tags) to a single private application and edit these associations as needed. This provides greater flexibility and control in managing private applications, simplifies policy configuration through tag-based rules, and streamlines updates by allowing dynamic modification of application group assignments.

Note: Any PA app where the server initiates the connection is not supported. Eg: active FTP, where the client waits for the server to initiate the connection. This will not work as a PA app.

Add an Application 

  1. Go to Settings > Infrastructure > Private Access Configuration.

    clipboard_e3da784abfc22429db6304c83548b0e10.png
     
  2. Select the Applications tab.

    2.png
     
  3. Under the Action menu, click Add Application.

    3.png

A new Add Application window appears.

4.png
 

  1. Complete the following fields: 
  • Name. Enter the name of the application.
  • Protocol. Select the protocol used to access an application. Supported protocols are HTTP, HTTPS, SSH, RDP over UDP, UDP, and Others (TCP). Make sure to consider prerequisites before selecting a protocol. 

    Note: To enable RDP over UDP settings, see the SCP configuration

clipboard_eaaa188999aea9edbd1dba07144f17fd0.png

NOTES:  

  • The Port field automatically populates the default port used by the selected protocol. If you do not want to use the default port numbers, you can change them. Make sure to specify the port when you select TCP, UDP, and Others ( TCP and UDP).
  • If your private application uses SMB protocol (port 445), then make sure to enable the Include traffic originating from OS Core option in the SCP configuration policy (.opg) file before exporting it. For more details, see Traffic Redirection
  • Type.  Select the type used to access an application. Supported types are Application or Network or Network and Application. 

    clipboard_e9ff8a4c90c351829a9da45e559cbfa0d.png


     
Application  Network Network and Application
Allowed entries: Domain/Host/IP/Domain Wildcard Allowed entries:  Valid Subnet value Allowed entries: Domain/Host/IP/Domain Wildcard
  • Application Examples:  
    • Domain -  test.sky.com 
    • Host/IP - 10.8.8.8  
    • Domain Wildcard - *test.sky.com  

 

 

 


Notes to be remembered:  
  • In the Application and Network and Application types, users can configure SmartMatch by defining  *test.com as a Private Application (PA). As a result, the system intercepts subdomains such as drive.test.com as PA, while it does not intercept drivetest.com as PA.
  • In Network type, if the user tries to access the private application using FQDN, it would be treated as Internet traffic. The user should be accessing the application via IP 
  • Data pertaining to any private application that has been accessed is visible on the Discovered Private Application page.
  • If a network subnet is added as a PA app, all the apps within that subnet must be reachable from all the connectors in the assigned connector group
  • The Network Level Access feature is exclusively accessible with the connector V2 version. To determine which connector is currently active, you can perform the following check: Go to Settings > Secure App Connector

Screenshot 2024-03-18.png

  • Port. Displays the port used to connect an application for the selected protocol. We support standard ports from 1 - 65535. You can specify the ports in multiple different ways
    • Range (80-90) 
    • Individual (80, 90, 8080)
    • Both (100-300, 80, 90) 

Note: You cannot add multiple applications with the same protocol, host, and port. Make sure to specify the port when you select UDP. 

  • Assign Applications Groups. Assign an existing application group, or create a new one and assign it to an application. Click Select to assign an existing group or select New to add an application group. To configure this in a Private Access policy, see Configure Private Access Rule.
  • Assign Connector Groups. Assign an existing connector group or create a connector group and assign it to an application. Click Select to assign an existing group or select New to add a connector group. 

    clipboard_e0d18461676d2ed34e40cc52815520a9e.png
     

NOTE: Any PA app that is public should be reachable directly from the connector, without any proxy in between the connector and the PA app 

  • Single Connector Traffic Routing  -  In a scenario wherein multiple connectors are there within a connector group, this UI toggle when enabled would ensure the traffic to go via a single connector (would be selected randomly) ensuring consistent traffic routing for a user session. This route would have a TTL of 3mins and extended by another 60 minutes on subsequent requests with a valid route.

    NOTE: If the Single Connector Traffic Routing toggle is enabled and the connector is unreachable for the application, switching the route or path to a different connector will result in approximately 3 minutes of downtime. 

    clipboard_ee30a57593f55bca5f0fe4d3585ef86ad.png
     
  • Users with Visiblity in Launchpad - Select the user to access an application. The selected users and user groups can view this application in their Private Application launchpad. 

NOTE: By default, all the applications will be visible to user lists and user groups. 

  •  User Names/List
    • Manually enter users - Enter the user name manually. Multiple users should be separated by a comma.

      6.png
       
    • Use a List - Select the User List from the available user lists.

      7.png

      Toggle Show selected only to view the list of selected user lists.

      8.png
       
  • User Groups - Select a User Group from the list of available user groups. To create a new list/group, see List Catalog.

    9.png

    Toggle Show selected only to view the list of selected user groups.

    10.png
  1.  Click Save

11.png

Add Applications by Importing a List

You can import a list of private applications rather than adding them individually. Your list of applications must be in a CSV format. You can create the CSV file using any text editor. The imported items are added to the Applications page. 

Before you begin

The .csv file must meet these requirements.

  • The file contains one list item per row.
  • The columns are separated by one of these characters: whitespace, tab, comma, semicolon, or a custom character.
  • The characters in the file are encoded with UTF-8 encoding. 
  1. Go to Settings > Infrastructure > Private Access Configuration.

    clipboard_ec195f6868238fbab1db975765e0f2a97.png
     
  2. Select the Applications tab.

    clipboard_e8cf011f1440e401b5d8947e724676646.png
     
  3. Under the Action menu, click Import Application list.

    clipboard_e92ed01253cc04be2f643dbf7883d8e36.png
     
  4.  In your file browser, select a .csv file to import, then click Open.

When you configure the import settings for the .csv file, you can:

  • Specify whether there is a header row.
  • Exclude rows from the import that start with the character you specify.
  • Avoid duplicate entries.
  • Specify whether leading and trailing whitespace is trimmed from the values in the columns.
  • Use the backslash character to include special characters. For example, you can use this option when the list items include the column separator. In this example, the column separator is a comma.

NOTE: Ensure the CSV or XLS file has all required columns to avoid errors during import. Download the sample CSV format from here.

 The following table shows the headers that are mandatory in the CSV file:

clipboard_ea17cb122a44033429381985ae5f5e50d.png
 

Header name Description
Application Name Name of the private application. 
Protocol Protocol used to connect an application. Supported protocols are HTTP, HTTPS, SSH, RDP, and Others (TCP).

Note: Only port 443 port and HTTPS protocol is supported for Clientless Access.
Type  Types used to access an application. Supported types are: application, network, nw_and_application.
Host Enter the fully qualified domain name (FQDN) of the application. Do not use smart match or IP address for the hostname.
Subnet Subnet is a network or set of IPs. 
Port The port used to connect an application for the selected protocol. You can enter the port number you want to use.
Application Group  The application group name (mandatory)
Connector Group The connector group name (optional).
Displays Yet to be assigned on the Applications page when you import with this field empty. You can assign it to a connector group later.
Clientless Access Enter True to enable Clientless Access and False to disable Clientless Access
  1. In the Import CSV dialog box, select the column separator, then configure these options:
    • Select First line contains column headers if the .csv file includes a header row.
    • Select Ignore lines beginning with character to specify a character to exclude the specified rows from the import. 
    • Select Use "\" for escaping special characters when you want the import to interpret the character following the backslash as a character instead of as a column separator.
    • Select Trim leading and trailing whitespace to trim leading and trailing whitespace from the values in the columns.
    • Select Avoid duplicate enteries to exclude duplicate application entries. 
       
  2. Review all the import settings and click Import. 

    clipboard_ee4670e5ff0c9e600220586d95c6cd090.png
     
  3. Applications will be added to the application dashboard. 

    clipboard_e7bf09d85c69118fe29f2b673385a45ac.png
     
  4. Once the import of the applications are completed. To make any changes to the application settings, click on the application that you want to edit. 

For more details on the following fields like protocol, type, and many more see Add an Application section.

Screenshot 405.jpg

  1. Once the changes are made, click Save and Publish the changes.

    clipboard_eec9272b7aa1b609a089fcc2f49aa597e.png
  • Once access to resources based on applications and networks is granted to users, you can navigate to the discovered private application page to gain further insights and information on how applications are being utilized within your private network.
  • These insights can be utilized to monitor the applications accessed by users, refine applications through updating application entries or importing lists, and control user access.

Note: To configure PA policy rules for UDP applications, see Configure Private Access Policy Rules for UDP Based Application  

  • Was this article helpful?