Quick Start

Congratulations! Now that you have successfully activated your Twingate account, it’s time to configure your Twingate network to protect and access your private Resources.


This guide will walk you through the required steps. The only prerequisite is that you have sufficient permissions to deploy either a Docker container or native Linux service on the Remote Network you’re configuring. Twingate Connectors are deployed behind your firewall, and only require internet egress permissions.

To get started, begin by defining a new Remote Network ->

Summary of Steps

1. Define a Remote Network You will create a new Remote Network in Twingate within which you will define Resources that users can be given access to.

2. Create and provision a new Connector Twingate Connectors provide encrypted connectivity into a Remote Network, and can be deployed into a wide variety of environments. Start by deploying a Connector into your newly created Remote Network.

3. Access your proected Resources with the Twingate Client With your Twingate network configured, the Twingate Client application allows you to connect to Resources you are authorized to access.

Last updated 2 days ago