Skip to main content
Star us on GitHub Star

Application Access Model

This article describes the various edge deployments of ZiTi App Access. In all cases, the Controller and at least 2 Public Edge Routers are to be deployed for redundancy. The Ziti Fabric connections are established between all Edge Routers but not Clients/SDKs. The Public Edge Routers would provide connection between Private Edge Routers and/or Clients/SDKs.

Note
  • Recommended configuration deployment of Public Edge Routers is to have only Ziti Edge enabled and of Private Edge Routers is to have Ziti Edge enabled with Tunnel option being required for cases where the Zero Trust domain ends at the private edge router.

  • Acronyms used in this article:

    • ZDE - Ziti Desktop Edge
    • ZME - Ziti Mobile Edge
    • ZET - Ziti Edge Tunnel
  1. Application to Application A Deployment  

    image

    Details
    • Client is SDK integrated.
    • Application is SDK integrated.
    Advantages
    • Application to Application Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • SDK and Application source code availability

  2. Application to Application B Deployment  

    image

    Details
    • Client is SDK integrated
    • Application is SDK integrated
    Advantages
    • Application to Application Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • SDK and Application source code availability

  3. Application to Application C Deployment  

    image

    Details
    • Client is SDK integrated
    • Application is SDK integrated.
    Advantages
    • No need to deploy private edge routers
    • Application to Application Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Fabric is not extended into application network
    • SDK and Application source code availability

  4. Application to Host A Deployment  

    image

    Details
    • Client is SDK integrated
    • Application has a client software (ZET) deployed
    Advantages
    • Application to Host Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Software must be deployed to application servers
    • SDK and Application source code availability

  5. Application to Host B Deployment  

    image

    Details
    • Client is SDK integrated
    • Application has a client software (ZET) deployed
    Advantages
    • Application to Host Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Software must be deployed to application servers
    • SDK and Application source code availability

  6. Application to Host C Deployment  

    image

    Details
    • Client is SDK integrated
    • Application has a client software (ZET) deployed
    Advantages
    • No need to deploy private edge routers
    • Application to host Encryption
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Fabric is not extended into application network
    • SDK and Application source code availability

  7. Application to Router A Deployment  

    image

    Details
    • Client is SDK integrated
    • Application is behind private router
    Advantages
    • No software must be deployed to application servers
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Less secure, connection from private router to application is not protected
    • SDK and Application source code availability

  8. Application to Router B Deployment  

    image

    Details
    • Client is SDK integrated.
    • Application is behind private router
    Advantages
    • No software must be deployed to application servers
    • No additional routing needed
    • No additional DNS entries needed
    Things to consider while deciding
    • Less secure, connection from private router to application is not protected
    • SDK and Application source code availability