Jump to Content
Guide
Release notes
Guide
Guide
Release notes
Welcome
Welcome to Zero Trust Client
About Access, Threat Protection, and Segmentation
Zero Trust Client rollout process
Desktop client
Requirements
Prepare for Zero Trust Client setup
Forward proxy support
Set up Threat Protection
Set up Zero Trust Client
Configure the client
Uninstall the client
Rollback to the standalone EAA or ETP Client
Multi-user support
Basic operations
Advanced features
Contextual menu, icons, and client status
Mobile client
About Zero Trust Client for mobile
Requirements
Limitations
Distribute the mobile client
Distribute the mobile client with Microsoft Intune
Distribute the mobile client with Workspace ONE UEM
Distribute the mobile client with JAMF
Set up Zero Trust Client Mobile
Install SIA Proxy MITM certificate
Configure the mobile client
Use the mobile client
Enterprise Center for Zero Trust Client
Manage Zero Trust Client
Configure Threat Protection
Transparent traffic interception
View Client Inventory
View device details
Troubleshoot
Desktop client
Known issues, caveats, and limitations
Mobile client
Suggest
Akamai.com
Linode.com
Contact us
Akamai support
Linode support
Share feedback
Try Akamai
Log in
Log out
Try Akamai
Akamai.com
Linode.com
Contact us
Akamai support
Linode support
Share feedback
Log in
Log out