8. Zero-Trust Application Access
Overview
pyrasp
Zero-Trust Application Access (ZTAA) enables to restrict access to a protected application only from browsers running a properly configured agent.
Optionnally pyrasp
may require the browser to be running the matest version in order to prevent connections from potentially vulnerable (and therefore compromised) browsers.
ZTAA data are transmitted to pyrasp
through a specific header:
Browser fingerprint (currently unused)
Browser update status
The header is a JWT signed with one of the valid keys specified in the configuration. If the header is not present or the JWT signature validation fails, the request is processed as an attack, depending on the configuration.
Configuration
3 parameters are necessary to properly configure ZTAA on pyrasp
:
ZTAA_HEADER
: the name of the header used for ZTAA validation (default:pcb-ztaa
)ZTAA_KEYS
: list of valid keys, designed to provide specific key of each user and enable key repudiationZTAA_BROWSER_VERSION
: enables browser version check
Agent
Agent is a browser plugin currently available only for Chromium-based browsers.
Installation
Download unpacked version from https://github.com/rbidou/pyrasp-agent
Go to the
chrome://extensions
oredge://extensions
pageEnable Developper mode
Click Load unpacked button
Select the directory where the unpacked agent was downloaded
Agent is installed
Configuration
To configure the agent:
Click on the agent icon, greyed until configuration is set
Enter the header name, application hostname (and port if non-standard) or URL, and the secret key
Click the Update ZTAA Settings button
Agent icon turns to blue
Last updated