Accessibility Resource Center Skip to main content
end of navigation menu
888-789-1223Contact sales

Trusted Connection Welcome Kit

Overview

Trusted Connection is a security focused Verizon solution that enables customers to securely manage access to SaaS (Software as a Service) applications.  The solution is managed by an administrator from a dedicated  portal.  The service is an end-to-end turnkey solution that includes mobility devices, network access, security and application connectivity.

Trusted Connection is available in two packages to allow customers to choose the level of control they need – Trusted Connection and Trusted Connection Plus.

3 simple steps to start securing your business today with Trusted Connection

Full|Five people in a conference room collaborating with a remote employee

Getting Started

Your designated SPOC and users with an Administrator role in the Verizon My Business portal will receive an email with instructions on how to set up Trusted Connection and deploy the Trusted Connection agent to your end users’ devices.

Trusted Connection Setup

As the Trusted Connection Administrator, you are responsible for the initial setup. Simply click on the Trusted Connection link either in My Business portal or access the Trusted Connection portal directly and click “Get started”.

Setting up the service takes three simple steps:

A. Set up user identities

Trusted Connection currently supports many Identity Management (IDP) systems as part of the Bring Your Own Identity Access Provider (BYOID) feature. As long as the system is based on LDAP/SAML, it can be synched to Trusted Connection. Okta Identity Access Management is being used here as an example of how to connect to your system.

When selecting LDAP with Active Directory, you will need to have the following information:

See OpenLDAP for more details about LDAP requirements.

  1. FQDN or IP Address
  2. VPN name
  3. Port number
  4. Bind DN
  5. Bind password
  6. Domain name Base DN
  7. SSL mode (optional)
  8. CA certificate (optional)

If you select SAML, you will need the following information:

  1. ACS URLs
  2. Selected ACS Url
  3. Service provider entity ID
  4. Single Sign-on URL * mandatory information
  5. Identity provider entity ID *information
  6. Identity provider certificate (add if certificate is not available or choose from drop down)
  7. Group attribute information

Trusted Connection supports (SAML) Security Assertion Mark-up Language integration is an authentication standard that allows for federated identity management and can support single sign-on (SSO), allowing users to authenticate via a SSO to their applications.

Trusted Connection supports Okta Identity Access Management as well as other Identity management programs (IDP),as part of the BYOID feature.

SAML without Active Directory configuration: if you are not using Active Directory, the specific steps and requirements will vary depending on the IDP you use. Refer to the documentation of the application for details and more information of how to find the information needed. However, the general process involved setting up SAML assertions and configuring the necessary metadata.

SAML with Active Directory configuration: When using Active Directory, you need to configure your Active Directory environment related fields and Trusted Connection to establish a connection between the two systems to configure appropriate settings for user attributes.

If you opt to choose SAML with Active directory, you will need the following additional information. * are mandatory fields to make successful connections.

  1. Server Address Type*
  2. Server Address*
  3. VPN name*
  4. Port*
  5. Bind DN*
  6. Bind password *
  7. Domain name *
  8. Base DN *
  9. Group Object Class *
  10. Group Name *
  11. Group Member *
  12. User Object Class *
  13. Username *
  14. Enable SSL
  15. SSL mode *
  16. CA certificate *



B. Then select “Test Connection

After you receive “Successful connection” notification, click on save.



C. Select network security settings

Click “Proceed” under Network securing settings.

By default, Trusted Connection provides a set of predefined security rules to help protect your network against threats. These rules can be customized to your requirements from the Trusted Connection dashboard after initial setup is completed.

URL Filtering – Restricts access to specific websites promoting security and compliance

DNS Filtering – Controls access to websites based on their domain names to help protect against phishing attacks and other cyberthreats.

Malware Protection – Detects, blocks and removes malicious software

IP Filtering – Blocks access to specific IP addresses based on IP reputation

File Filtering – Controls access to files based on specific criteria such as file type, user identity, device security posture and other contextual information

SafeSearch – Helps filter out explicit content from search engine results

Cloud access security broker (CASB) – Implements zero-trust access control and policy enforcement for cloud SaaS applications (Trusted Connection Plus only)

Select “Done” on this screen:

Trusted Connection

Trusted Connection Plus

Select “Proceed” to install and configure the Trusted Connection agent

Choose “With MDM” or “No MDM” (or Do it later):

With MDM Option:
Select “Verizon MDM” or “Other MDM” and follow the instructions provided:Once you have completed the steps for MDM, select “Done”

Once you have completed the steps for MDM, select “Done”

Without MDM Option:

Trusted Connection is designed to work with an MDM, either the Verizon MDM solution or other third party MDMs. If you do not presently have an MDM, please contact your sales point of contact to find out how to add the Verizon MDM. If you do not wish to use an MDM at this point, Trusted Connection will provide an email template to the customer administrator, with instructions on how to distribute agent download links to their organization's employees. The email will include links to agent downloads for various operating systems (Windows, Linux, iOS, macOS, and Android).

Note: If you choose to not use an MDM, your end users will have to install the agent on their devices, which involves several steps to complete.

That’s it – you are ready to explore the Trusted Connection dashboard. Click “Done”.

Trusted Connection Dashboard Overview

Trusted Connection Dashboard

The Trusted Connection dashboard provides a snapshot of your network and security analytics. Please note that any end user data will only appear after users download, install and activate the Verizon Secure Access client on their devices.

Trusted Connection Management

Trusted Connection Administrators are able make changes to the security settings and manage the service in a variety of ways:

  • Web Security settings allow you to further configure the preset rules applied upon initial setup. To modify these default policies, select the pencil icon under Actions for Verizon Default Security Rules.

Click the “Review” button to review/edit all web security policies, or click the green “Enabled” button to edit specific web security policies.

Note: Predefined security policy settings are applied to all users by default. Trusted Connection Plus customers have the option to apply security policies to specific users/groups.

  • Users allow you to view users and user groups using the data that is synched with your LDAP enabled IDP.

  • Network tunnel – Set up or modify an encrypted IPSEC tunnel to permit private traffic from end user devices to the Verizon Gateway for inspection.

  • Administrators can create up to two network tunnels by default. With a Plus subscription, administrators can create up to eight tunnels to accommodate their organization's specific networking requirements.



Trusted Connection Monitoring

Displays key information such as site health, threats, risky URLs, user data, device data, and logs. Drill downs into each area are available within the Trusted Connection portal.

Trusted Connection Tickets Overview

The Tickets Overview screen will show you a list of open or closed tickets.  On the ticket list you will see summaries at the top along with a filter to limit the time frame shown.  Use the plus sign to see more information about that ticket and under the description select view details for even more.  Open tickets are shown by default and  you can get a closed ticket list as well by selecting that option. 

Customer Service

Technical Support

Please contact: [email protected] for any product related technical questions.

Billing Questions

Please contact: [email protected] for any billing questions.

Why Verizon

Verizon is a proven network security leader with 30+ years experience delivering and managing and securing complex global networks.

Performance, Reliability and Security  

Verizon’s award-winning, reliable, secure nationwide 4G LTE & 5G network available in a variety of speeds to meet your business needs. FIOS is the ultra-fast fiber-optic connection with 99.99% network reliability.

Simplicity

Trusted Connection provides simple step-by-step instructions to get your business up and running with zero-trust connectivity quickly. Preset security options make it simple to get started by providing options to customize the service for your business.

Peace of Mind

Verizon is there for your business. In the event of a ransomware attack or data breach, Trusted Connection customers will have the option to quickly engage highly skilled security professionals via a 24/7 hotline for emergency service support.

¹LDAP stands for Lightweight Directory Access Protocol. It’s like a phone book for computer systems. It helps them find and access information about users, computers, and other resources on a network.

Let’s connect

Call sales
888-789-1223

Chat with us
Start live chat

Have us contact you
Request a call

Already have an account?   Log inExplore support