Quickstart: Configure per-app access to private resources

This quickstart shows you the steps needed to configure per-app access to private resources. To learn more about Global Secure Access, see What is Global Secure Access?

Prerequisites

Administrators who interact with Global Secure Access features must have the Global Secure Access Administrator role. Some features might also require other roles.

To follow the Zero Trust principle of least privilege, consider using Privileged Identity Management (PIM) to activate just-in-time privileged role assignments.

The product requires licensing. For details, see the licensing section of What is Global Secure Access?. If needed, you can purchase licenses or get trial licenses. To use the Microsoft traffic forwarding profile, a Microsoft 365 E3 license is recommended.

Configure per-app access to private resources

Create specific private apps for granular segmented access to private access resources using Microsoft Entra Private Access.

Diagram of the Global Secure Access app traffic flow for private resources.

  1. Configure a private network connector and connector group.
  2. Create a private Global Secure Access application.
  3. Enable the Private Access traffic forwarding profile.
  4. Install and configure the Global Secure Access Client on end-user devices.

After you complete these steps, users with the Global Secure Access client installed on a Windows device can connect to your private resources through a Global Secure Access app and private network connector.

Optionally:

Next step