Skip to main content
Star OpenZiti on GitHub Star

Zero Trust Models

All OpenZiti deployment architectures can be categorized by three Zero Trust Edge Access Security Models. Many deployments will use more than one model, especially in brownfield environments. Each model offers a different tradeoff between integration effort and security posture - choose the one that fits your requirements, or mix and match across services.

App Access (ZTAA)

The Zero Trust is maintained between Applications, and the encryption terminated in Applications

image


Host Access (ZTHA)

The Zero Trust is maintained between Application Hosts, and the encryption terminated at Application Hosts  

image


Network Access (ZTNA)

The Zero Trust is only maintained between Ziti Private Edge Routers, and the encryption is terminated at Ziti Private Edge Routers  

image