Enterprise Center is the primary management portal for Enterprise Application Access (EAA). It is the next-generation administration portal that delivers a unified experience across Enterprise Application Access, Enterprise Threat Protector, and Akamai MFA. It has been designed to deliver a modern look-and-feel of Akamai Control Center that simplifies and streamlines the administration experience.
Akamai’s Enterprise Application Access (EAA) integrates data path protection, identity access, multi-factor authentication, application security, and management visibility and control for applications hosted in data centers and hybrid cloud environments. Using it, the management and control of remote access for employees, contractors, and partners become less complex and more secure.
EAA delivers access to applications, not the entire network. With EAA, users don't access applications directly—instead, apps are hidden from the Internet and public exposure. A unique dual-cloud architecture closes all inbound firewall ports while providing authenticated end-users with access to only their own special applications.
EAA delivers clientless access to browser-based (HTTP) applications and lets an organization secure access to remote desktop (RDP) and Secure Shell (SSH) applications.
You can use the EAA Client software deployed on end-users machines for securing non-browser client-access applications running locally on the end user’s computer, which communicate over the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), or both protocols.
EAA Device Posture is a key feature of EAA for user access to enterprise applications, and a valuable component of the Akamai Zero Trust model. It complements and enhances existing EAA authentication, authorization, access control rules, and reporting capabilities, providing additional context about the device posture and a device risk assessment to better inform application access policy. Device Posture captures signal data from devices in the environment. Using this information, IT administrators can augment the existing application access control lists (ACLs) with rules that account for the device posture and associated risks. Device Posture helps to ensure that the devices accessing applications satisfy the necessary security requirements.
This is the guide for EAA legacy UI. It is recommended you migrate to the Enterprise Center for EAA since this legacy UI will be deprecated soon.
Updated 25 days ago