Trusted Connection is a security focused Verizon solution that enables customers to securely manage access to SaaS (Software as a Service) applications. The solution is managed by an administrator from a dedicated portal. The service is an end-to-end turnkey solution that includes mobility devices, network access, security and application connectivity.
Trusted Connection is available in two packages to allow customers to choose the level of control they need – Trusted Connection and Trusted Connection Plus.
Getting Started
Your designated SPOC and users with an Administrator role in the Verizon My Business portal will receive an email with instructions on how to set up Trusted Connection and deploy the Trusted Connection agent to your end users’ devices.
Trusted Connection Setup
As the Trusted Connection Administrator, you are responsible for the initial setup. Simply click on the Trusted Connection link either in My Business portal or access the Trusted Connection portal directly and click “Get started”.
Setting up the service takes three simple steps:
Trusted Connection currently supports many Identity Management (IDP) systems as part of the Bring Your Own Identity Access Provider (BYOID) feature. As long as the system is based on LDAP/SAML, it can be synched to Trusted Connection. Okta Identity Access Management is being used here as an example of how to connect to your system.
When selecting LDAP with Active Directory, you will need to have the following information:
See OpenLDAP for more details about LDAP requirements.
If you select SAML, you will need the following information:
Trusted Connection supports (SAML) Security Assertion Mark-up Language integration is an authentication standard that allows for federated identity management and can support single sign-on (SSO), allowing users to authenticate via a SSO to their applications.
Trusted Connection supports Okta Identity Access Management as well as other Identity management programs (IDP),as part of the BYOID feature.
SAML without Active Directory configuration: if you are not using Active Directory, the specific steps and requirements will vary depending on the IDP you use. Refer to the documentation of the application for details and more information of how to find the information needed. However, the general process involved setting up SAML assertions and configuring the necessary metadata.
SAML with Active Directory configuration: When using Active Directory, you need to configure your Active Directory environment related fields and Trusted Connection to establish a connection between the two systems to configure appropriate settings for user attributes.
If you opt to choose SAML with Active directory, you will need the following additional information. * are mandatory fields to make successful connections.
After you receive “Successful connection” notification, click on save.
Click “Proceed” under Network securing settings.
By default, Trusted Connection provides a set of predefined security rules to help protect your network against threats. These rules can be customized to your requirements from the Trusted Connection dashboard after initial setup is completed.
URL Filtering – Restricts access to specific websites promoting security and compliance
DNS Filtering – Controls access to websites based on their domain names to help protect against phishing attacks and other cyberthreats.
Malware Protection – Detects, blocks and removes malicious software
IP Filtering – Blocks access to specific IP addresses based on IP reputation
File Filtering – Controls access to files based on specific criteria such as file type, user identity, device security posture and other contextual information
SafeSearch – Helps filter out explicit content from search engine results
Cloud access security broker (CASB) – Implements zero-trust access control and policy enforcement for cloud SaaS applications (Trusted Connection Plus only)
Select “Done” on this screen:
Trusted Connection
Trusted Connection Plus
Select “Proceed” to install and configure the Trusted Connection agent
Choose “With MDM” or “No MDM” (or Do it later):
With MDM Option:
Select “Verizon MDM” or “Other MDM” and follow the instructions provided:Once you have completed the steps for MDM, select “Done”
Once you have completed the steps for MDM, select “Done”
Without MDM Option:
Trusted Connection is designed to work with an MDM, either the Verizon MDM solution or other third party MDMs. If you do not presently have an MDM, please contact your sales point of contact to find out how to add the Verizon MDM. If you do not wish to use an MDM at this point, Trusted Connection will provide an email template to the customer administrator, with instructions on how to distribute agent download links to their organization's employees. The email will include links to agent downloads for various operating systems (Windows, Linux, iOS, macOS, and Android).
Note: If you choose to not use an MDM, your end users will have to install the agent on their devices, which involves several steps to complete.
That’s it – you are ready to explore the Trusted Connection dashboard. Click “Done”.
Trusted Connection Dashboard
The Trusted Connection dashboard provides a snapshot of your network and security analytics. Please note that any end user data will only appear after users download, install and activate the Verizon Secure Access client on their devices.
Trusted Connection Management
Trusted Connection Administrators are able make changes to the security settings and manage the service in a variety of ways:
Web Security settings allow you to further configure the preset rules applied upon initial setup. To modify these default policies, select the pencil icon under Actions for Verizon Default Security Rules.
Click the “Review” button to review/edit all web security policies, or click the green “Enabled” button to edit specific web security policies.
Note: Predefined security policy settings are applied to all users by default. Trusted Connection Plus customers have the option to apply security policies to specific users/groups.
Users allow you to view users and user groups using the data that is synched with your LDAP enabled IDP.
Network tunnel – Set up or modify an encrypted IPSEC tunnel to permit private traffic from end user devices to the Verizon Gateway for inspection.
Administrators can create up to two network tunnels by default. With a Plus subscription, administrators can create up to eight tunnels to accommodate their organization's specific networking requirements.
Trusted Connection Monitoring
Displays key information such as site health, threats, risky URLs, user data, device data, and logs. Drill downs into each area are available within the Trusted Connection portal.
Trusted Connection Tickets Overview
The Tickets Overview screen will show you a list of open or closed tickets. On the ticket list you will see summaries at the top along with a filter to limit the time frame shown. Use the plus sign to see more information about that ticket and under the description select view details for even more. Open tickets are shown by default and you can get a closed ticket list as well by selecting that option.
Please contact: [email protected] for any product related technical questions.
Please contact: [email protected] for any billing questions.
Verizon is a proven network security leader with 30+ years experience delivering and managing and securing complex global networks.
Performance, Reliability and Security
Verizon’s award-winning, reliable, secure nationwide 4G LTE & 5G network available in a variety of speeds to meet your business needs. FIOS is the ultra-fast fiber-optic connection with 99.99% network reliability.
Simplicity
Trusted Connection provides simple step-by-step instructions to get your business up and running with zero-trust connectivity quickly. Preset security options make it simple to get started by providing options to customize the service for your business.
Peace of Mind
Verizon is there for your business. In the event of a ransomware attack or data breach, Trusted Connection customers will have the option to quickly engage highly skilled security professionals via a 24/7 hotline for emergency service support.