How Twingate Works

Twingate's architecture ensures that no single component can independently authorize traffic flow to a resource. User access and data flow require confirmation from at least two components, providing an added layer of security.

Identity Provider

Environment Type

Legend

Twingate component managed by Twingate

Twingate component managed by customer