AWS Verified Access
Overview
AWS Verified Access is a service that enables you to provide secure access to your corporate applications without requiring a VPN.…
AWS Verified Access is a service that enables you to provide secure access to your corporate applications without requiring a VPN. Using Verified Access, you can configure fine-grained access for your applications, ensuring that application access is granted only when users meet the specified security requirements (e.g., user identity and device security status). The browser extension links the device security status to AWS Verified Access. If you are not using device security status in access policies, then your users don't need the browser extension. By downloading the browser extension for AWS Verified Access, you agree to the AWS customer agreement, AWS service terms, and AWS privacy notice. If you already have an AWS customer agreement, or other agreement governing your use of the AWS services, you agree that the terms of that agreement govern your download and use of this service. AWS collects performance metrics, including metrics about your software and hardware configuration and usage patterns. Unless you affirmatively consent, we do not collect personal information like usernames or email address.
0 out of 5No ratings
Google doesn't verify reviews. Learn more about results and reviews.
Details
- Version0.1.4
- UpdatedDecember 19, 2023
- Offered byaws-verified-access-browser-extension
- Size186KiB
- LanguagesEnglish
- Developer
Email
aws-verified-access-browser-extension@amazon.com - Non-traderThis developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.
Privacy
AWS Verified Access has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.
AWS Verified Access handles the following:
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes