Prisma Browser Connector for Secure Access to Private Apps
Secure private applications on remote, unmanaged devices with Prisma Browser
Connector, by allowing Prisma Browser to seamlessly connect to Data Centers using
ZTNA-Connectors.
Where Can I Use This?
What Do I Need?
Prisma Browser Standalone
Prisma Browser Standalone license
Prisma Browser Connector dd-on license
Prisma Browser Connector
Network Administrator or Superuser role.
Prisma® Browser Connector integrates Prisma Browser with ZTNA Connector to
provide secure access to private applications. This feature simplifies private
application access for remote unmanaged devices with new or existing Prisma Browser Standalone deployments or existing Next Generation Firewall
(NGFW) customers by eliminating the need for a full Prisma Access deployment. It
offers a streamlined, secure channel for private application traffic, focusing on
ease of use and integration within your network.
The Prisma Browser Connector leverages the Prisma Browser as a client-side
endpoint and a ZTNA Connector virtual machine (VM) in your private network.
Connection Protocols
The Prisma Browser Connector supports the following connection protocols:
MASQUE
HTTP 2
HTTP 1.1
The Prisma Browser Connector establishes a secure and efficient connection
using the MASQUE (QUIC) Protocol. If the QUIC protocol is unavailable or blocked
in transit, then it falls back to HTTP2 automatically.
The process involves:
Automated Connection and Orchestration: The Prisma Browser
Connector and MASQUE Proxy work with Orchestration for ZTNA-C (Zero
Trust Network Access Connector) to manage the connection.
Closest Region Selection: The Prisma Browser Connector
automatically selects the cloud region closest to where the
ZTNA-Connector is deployed.
Connection Establishment: The Prisma Browser establishes the
connection, creating Automated Tunnels across the Internet to the
selected worldwide data center location.
The Prisma Browser Connector supports secure access to both web-based
(HTTP/HTTPS) and non-web-based private applications (SSH/RDP). It is also able
to scale automatically to meet traffic needs.
The Prisma Browser Connector supports up to 10 ZTNA Connectors per deployment.
This allows you to manage the scope and resource allocation. For more
information, refer to ZTNA Connection Requirements and
Guidelines.
Deploy the Prisma Browser Connector for Private Application Access
This section provides the step-by-step instructions for configuring the Prisma
Browser Connector within the Strata Cloud Manager. This section describes:
Step 1: User Onboarding
Step 2: Private Application Setup
Step 3: Enforce SSO Applications
Step 4: Download and Distribute
Step 5: Browser Policy
Step 1: User Onboarding
Onboard users and configure Cloud Identity Engine (CIE)
integration. This establishes the necessary user
authentication framework, allowing authorized users to access private
applications via the Prisma Browser.
If you have already completed user onboarding as part of
the regular Prisma Browser Standalone onboarding process, you can skip this
step.
Specify the relevant user groups that will be granted access.
Step 2: Private Application Setup
Download and deploy the ZTNA Connector. This initiates
the deployment and configuration process for the ZTNA Connector, which serves as
the secure gateway for private application access.
Click the Private Applications tab.
Click DeployZTNA Connectors. This section defines the infrastructure and specific
private applications that the ZTNA Connector manages. In the dropdown
section, click “Follow the setup instructions in the ZTNA Connection
Configuration." Go to Configure ZTNA Connector
for more information.
When you configure Target Apps in the ZTNA
Connector, you must add them to the Prisma Browser Application page as
well. Apps added on IP Subnets are not currently supported on Prisma
Browser.
Open the Prisma Browser Applications page (ConfigurationPrisma BrowserApplications and select the Private Applications tab. This allows
you to define application targets using FQDNs, and wildcards. These
targets specify the internal private applications (web or non-web) the ZTNA
Connector will make accessible to Prisma Browser users.
Applications added to the ZTNA Connector must also
be added to the Prisma Browser in the Applications page.
Public apps configured as Private apps are not
supported.
Click Add private app, and enter the required information.
For more information, refer to Add a Private
Application.
Select the Non-web Apps tab and click Add non-web App if you need to
add apps that are SSH- or RDP-based. This extends secure access
capabilities beyond web-based applications to include other crucial
enterprise services.
The remaining steps are configured in a manner similarly to thoes in the Prisma
Browser Onboarding. Refer to the following steps:
Validate Private Application Access with Prisma Browser
Once the Strata Cloud Manager is properly configured, your end-users can validate
private application access using the Prisma Browser.
Step 1: Log into the Prisma Browser
Open the Prisma Browser application.
Complete the SSO login process, which typically redirects through your
configured CIE.§§§§§§§
Step 2: Access a Configured Private Web App
Access a configured private web application. This step verifies that web-based
private applications are correctly routed and accessible through the Prisma
Browser Connector infrastructure.
Navigate to the URL of a private web application (for example, WC app1
van2 auto.com) within the Prisma Browser.
Confirm successful access and functionality of the application.
Step 3: Access a Configured Private Non-Web App
Access a configured private non-web application (for example, SSH) using remote
connections. This validates secure access to non-web services, demonstrating the
full capability of the Prisma Browser Connector for diverse application
types.
In the Prisma Browser, go to Non-web connections..
Select and connect to a configured private non-web application, such as
an SSH server.
Provide any necessary credentials (for example, a private key)
and confirm a successful connection.
Step 4: Check the Troubleshooting Page
Review the Prisma Browser troubleshooting page for proxy status and routing
details. This diagnostic step allows you to confirm that traffic is being
correctly proxied through the Prisma Browser Connector infrastructure and to
identify any potential routing issues.
In the Prisma Browser address bar, type prisma://troubleshoot and
press Enter..
Review the Prisma integration page to verify the proxy
status, type (for example, MASQUE), and confirm that traffic is routing
over the MASQUE infrastructure for private applications.
Known Limitations
The following are the known limitations of the Prisma Browser Connector:
Apps added via IP Subnets are currently not supported. They can only be
defined using FQDNs and wildcards.
Public apps configured as Private apps are not supported.
Once a group, connector, or application is created, the IP blockers
cannot be changed.
The system supports a limit of up to 10 ZTNA Connectors per tenant.
If the MASQUE (QUIC) is not available or blocked, the system defaults to
HTTP2.
The system only supports RDP and SSH protocols for non-web apps.
Application targets must be defined using FQDNs or wildcards.
Some menus that are unavailable in Prisma Browser (but are
available in Prisma Access) may still appear in the interface;
however, these menus are not functional and should not be used.