• Docs
Sign inRequest DemoTry for free
  1. Home

    • Home
    • Guides
    • Use Cases
      • VPN Replacement
      • Infrastructure Access
      • Device Security Controls
      • Application Gating
      • Homelab & Personal Use Cases
      • Internet Security
      • Compliance
    • Architecture
      • Introduction to DNS
      • How Twingate Works
      • How DNS Works with Twingate
      • Twingate vs. VPNs
      • Twingate vs. Mesh VPNs
      • Peer-to-peer Communication
      • How NAT Traversal Works
        • How to troubleshoot peer-to-peer connections
      • Encryption in Twingate
  • managing twingate
    • Team
      • Users
        • Admins
        • How to Offboard Users
        • Social Logins
      • Groups
      • Identity Providers
        • Entra ID Configuration
        • Google Workspace Configuration
        • JumpCloud Configuration
        • Keycloak Configuration
        • Okta Configuration
        • OneLogin Configuration
        • SCIM Provisioning API
    • Devices
      • Client Application
        • Endpoint Requirements
        • Using Twingate
      • Managed Devices
        • Windows Client Migration to .NET 8
        • macOS & iOS
        • macOS standalone Client
        • Windows Managed Devices
      • Device Administration
        • 1Password XAM Configuration
        • CrowdStrike Configuration
        • Device Security Posture Checks
        • Device Security Guide
        • Intune Configuration
        • Jamf Configuration
        • Kandji Configuration
        • Linux device ID migration
        • Manually Verified Devices
        • SentinelOne Configuration
    • Analytics
      • Network Overview
      • Audit Logs
        • Admin Console Export
        • Audit Logs Schema
      • Network Traffic
        • Detailed Network Event Schemas
        • Network Events Admin Console Export
        • Network Summary Export
      • User Activity
      • Device Report
      • Syncing Data to AWS S3
    • Administration
      • Admin Console Security
      • Subscription Management
        • Upgrade to Twingate Home
      • Managed Service Providers
        • Customer Network
        • MSP Billing
      • Cancel Your Subscription
      • Notifications
    • Troubleshooting
      • Device Failures
      • DNS Failures
      • Connector Failures
      • Firewall Failures
      • Split Tunnel Failures
  • private access
    • Quick Start
      • Automated Deployment
    • Connectors
      • Understanding Connectors
      • Deploying Connectors
        • Aptible Deployment
        • AWS Deployment
        • Azure Deployment
        • Linux Deployment
        • GCP Deployment
        • K8s Helm Chart Deployment
      • Connector Best Practices
      • Updating Connectors
        • Docker Container Upgrades
        • K8s Helm Chart Upgrades
        • Systemd Service Upgrades
      • Advanced Connector Management
        • Connector Metrics Overview
        • Connector Logging
        • Connector Details
        • Connector Metadata
        • Supporting Unqualified Domain Names
        • Connector Health Checks
        • Deployment Automation
    • Resources
      • Remote Networks
        • Best Practices
      • Resource Tags
      • Aliases
    • Security Policies
      • Location requirements via geoblocking
      • Security Policies: Migration Guide
      • Policy Guides
        • Authentication
        • Device-only Resource Policies
        • Trusted Devices
        • Two-Factor Authentication
      • Two-Factor Authentication
      • JIT Access Requests
        • Reviewing Access Requests
      • Usage-based Auto-lock
      • Ephemeral Access
    • Services
      • Headless Clients
        • AWS ECS with Twingate (Headless & Userspace)
        • Linux Headless Mode
        • Windows Headless Mode
      • CI/CD Configuration
      • Userspace Networking
    • Kubernetes
      • Route Traffic from Kubernetes
      • Manage Kubernetes using kubectl
      • Private Resources in Kubernetes
      • Publicly Exposed Resources in Kubernetes
  • Identity Firewall
    • Overview
    • Privileged Access for Kubernetes
    • Privileged Access for SSH
      • Installing Privileged Access for SSH
      • Remote Development with Twingate SSH and VS Code
  • Internet Security
    • Overview
    • DNS Filtering
      • Client Configuration
      • NextDNS Integration
    • DNS-over-HTTPS (DoH)
    • Exit Networks
  • Developers
    • API
      • Getting Started with the API
        • Exploring the APIs
        • Introduction to the Twingate Javascript CLI
        • Introduction to the Twingate Python CLI
      • Schema
    • Terraform Provider ↗
    • Pulumi Provider ↗
    • Twingate Labs ↗
  • additional resources
    • Help Center ↗
      • Need help?
      • Troubleshooting
    • Changelog
    • FAQ
    • Twingate Trust Center
      • Twingate & Customer Data
      • DORA Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • PCI Compliance
      • SOC 2 Report
      • Responsible Disclosure Policy
    • Home
    • Guides
    • Use Cases
      • VPN Replacement
      • Infrastructure Access
      • Device Security Controls
      • Application Gating
      • Homelab & Personal Use Cases
      • Internet Security
      • Compliance
    • Architecture
      • Introduction to DNS
      • How Twingate Works
      • How DNS Works with Twingate
      • Twingate vs. VPNs
      • Twingate vs. Mesh VPNs
      • Peer-to-peer Communication
      • How NAT Traversal Works
        • How to troubleshoot peer-to-peer connections
      • Encryption in Twingate
  • managing twingate
    • Team
      • Users
        • Admins
        • How to Offboard Users
        • Social Logins
      • Groups
      • Identity Providers
        • Entra ID Configuration
        • Google Workspace Configuration
        • JumpCloud Configuration
        • Keycloak Configuration
        • Okta Configuration
        • OneLogin Configuration
        • SCIM Provisioning API
    • Devices
      • Client Application
        • Endpoint Requirements
        • Using Twingate
      • Managed Devices
        • Windows Client Migration to .NET 8
        • macOS & iOS
        • macOS standalone Client
        • Windows Managed Devices
      • Device Administration
        • 1Password XAM Configuration
        • CrowdStrike Configuration
        • Device Security Posture Checks
        • Device Security Guide
        • Intune Configuration
        • Jamf Configuration
        • Kandji Configuration
        • Linux device ID migration
        • Manually Verified Devices
        • SentinelOne Configuration
    • Analytics
      • Network Overview
      • Audit Logs
        • Admin Console Export
        • Audit Logs Schema
      • Network Traffic
        • Detailed Network Event Schemas
        • Network Events Admin Console Export
        • Network Summary Export
      • User Activity
      • Device Report
      • Syncing Data to AWS S3
    • Administration
      • Admin Console Security
      • Subscription Management
        • Upgrade to Twingate Home
      • Managed Service Providers
        • Customer Network
        • MSP Billing
      • Cancel Your Subscription
      • Notifications
    • Troubleshooting
      • Device Failures
      • DNS Failures
      • Connector Failures
      • Firewall Failures
      • Split Tunnel Failures
  • private access
    • Quick Start
      • Automated Deployment
    • Connectors
      • Understanding Connectors
      • Deploying Connectors
        • Aptible Deployment
        • AWS Deployment
        • Azure Deployment
        • Linux Deployment
        • GCP Deployment
        • K8s Helm Chart Deployment
      • Connector Best Practices
      • Updating Connectors
        • Docker Container Upgrades
        • K8s Helm Chart Upgrades
        • Systemd Service Upgrades
      • Advanced Connector Management
        • Connector Metrics Overview
        • Connector Logging
        • Connector Details
        • Connector Metadata
        • Supporting Unqualified Domain Names
        • Connector Health Checks
        • Deployment Automation
    • Resources
      • Remote Networks
        • Best Practices
      • Resource Tags
      • Aliases
    • Security Policies
      • Location requirements via geoblocking
      • Security Policies: Migration Guide
      • Policy Guides
        • Authentication
        • Device-only Resource Policies
        • Trusted Devices
        • Two-Factor Authentication
      • Two-Factor Authentication
      • JIT Access Requests
        • Reviewing Access Requests
      • Usage-based Auto-lock
      • Ephemeral Access
    • Services
      • Headless Clients
        • AWS ECS with Twingate (Headless & Userspace)
        • Linux Headless Mode
        • Windows Headless Mode
      • CI/CD Configuration
      • Userspace Networking
    • Kubernetes
      • Route Traffic from Kubernetes
      • Manage Kubernetes using kubectl
      • Private Resources in Kubernetes
      • Publicly Exposed Resources in Kubernetes
  • Identity Firewall
    • Overview
    • Privileged Access for Kubernetes
    • Privileged Access for SSH
      • Installing Privileged Access for SSH
      • Remote Development with Twingate SSH and VS Code
  • Internet Security
    • Overview
    • DNS Filtering
      • Client Configuration
      • NextDNS Integration
    • DNS-over-HTTPS (DoH)
    • Exit Networks
  • Developers
    • API
      • Getting Started with the API
        • Exploring the APIs
        • Introduction to the Twingate Javascript CLI
        • Introduction to the Twingate Python CLI
      • Schema
    • Terraform Provider ↗
    • Pulumi Provider ↗
    • Twingate Labs ↗
  • additional resources
    • Help Center ↗
      • Need help?
      • Troubleshooting
    • Changelog
    • FAQ
    • Twingate Trust Center
      • Twingate & Customer Data
      • DORA Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • PCI Compliance
      • SOC 2 Report
      • Responsible Disclosure Policy

Documentation

Learn how to secure everything from staging environments to SaaS apps with Zero Trust principles that are easy to use and administer.

Take a guided tour of our product with an overview video

3 min video

Deploy Twingate in 15-minutes with our Quick Start guide
Leverage our API to automate your network security

Architecture

How Twingate Works

The technical components behind Twingate

Twingate vs. VPN

How Twingate differs from a VPN

Use Cases

VPN Replacement

Remote access to private resources and networks

Infrastructure Access

Manage & automate access to technical infrastructure

Device Controls

Enforce device requirements for resource access

IP-Based Access

Access third-party services that require IP whitelisting

Internet Security

Secure public internet traffic with DNS filtering

Compliance

Meet compliance requirements with security controls

Homelab & Personal Use Cases

Secure, remote access to your home network

Last updated 2 years ago


macOS

iOS

Windows

Android

Linux

Chrome

Status page ↗

Copyright © 2026 Twingate.