Product Features & Functionality
Twin Tunnel Configuration in ISA Deployment: A Technical Overview
The twin tunnel configuration is an advanced setup designed for specific circumstances within the ISA deployment framework. In the standard ISA deployment, a single ISA Controller serves as a conduit between remote users and the corporate resources ...
Platforms Supported for Endpoint Agent Installation
The ISA User Agent is supported in the following operating systems: Operating System Version Name Windows 32 and 64 bits 8, 10, and 11 macOS 13.2.1, 13.3 Mountain Lion and above Linux 64-bit Ubuntu 18, 20, and 22 Peppermint, Debian, Red Hat, Amazon ...
Contextual Access Management
Contextual access in the context of enterprise remote access refers to the concept of granting or restricting access to resources based on various contextual factors. Instead of relying solely on traditional methods like username and password, ...
Advantages of Always-On mode and when it should be implemented
When an InstaSafe Secure Access (ISA) user has Authentication Type set to ‘Certificate’ instead of Password+Certs, this is defined as Always-On mode. Always-On mode has the following advantages: The InstaSafe User Agent will always be running in the ...
Active-Active and Active-Passive Deployment of the ISA Controller
Active and Passive Modes Active Mode - When the Controller status is Running, the Controller is in active mode. In this state, the controller is actively performing its designated functions, tasks, or processes, and it is ready to receive and respond ...
When to perform start, stop, restart, and commit operations of the ISA Controller
The ISA web portal administrator can perform the following operations on the Controller: Start - To initiate or activate a Controller. It allows the Controller to begin its operations or perform its designated tasks. Starting a Controller means ...
Deploying the ISA Controller
The InstaSafe Controller plays a pivotal role within the InstaSafe Cloud, serving as the central module for enforcing access control in network connectivity. It acts as the central point to which InstaSafe Agents and Gateway Agents establish ...