Zero Trust made easy with Twingate integrations
Zero Trust made easy with Twingate integrations
Zero Trust made easy with Twingate integrations
Identity & Authentication
Streamline authentication, user management, and provisining through your existing identity provider (IdP).
Identity & Authentication
Streamline authentication, user management, and provisining through your existing identity provider (IdP).
Rippling
On our roadmap
Rippling
On our roadmap
Rippling
On our roadmap
Okta
Bridge identity management and policy-based access controls with Twingate and Okta.
Okta
Bridge identity management and policy-based access controls with Twingate and Okta.
Okta
Bridge identity management and policy-based access controls with Twingate and Okta.
Google Workspace
Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.
Google Workspace
Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.
Google Workspace
Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.
Microsoft Azure Active Directory
Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.
Microsoft Azure Active Directory
Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.
Microsoft Azure Active Directory
Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.
OneLogin
Leverage OneLogin for authentication and user group synchronization via SCIM.
OneLogin
Leverage OneLogin for authentication and user group synchronization via SCIM.
OneLogin
Leverage OneLogin for authentication and user group synchronization via SCIM.
Duo Security
Leverage Duo Security as an MFA application for Twingate-protected resources.
Duo Security
Leverage Duo Security as an MFA application for Twingate-protected resources.
Duo Security
Leverage Duo Security as an MFA application for Twingate-protected resources.
JumpCloud
Synchronize user accounts and delegate authentication with Twingate and JumpCloud.
JumpCloud
Synchronize user accounts and delegate authentication with Twingate and JumpCloud.
JumpCloud
Synchronize user accounts and delegate authentication with Twingate and JumpCloud.
Keycloak
Delegate user authentication to Keycloak via OIDC.
Keycloak
Delegate user authentication to Keycloak via OIDC.
Keycloak
Delegate user authentication to Keycloak via OIDC.
Authenticate via your Google Account to access Twingate.
Authenticate via your Google Account to access Twingate.
Authenticate via your Google Account to access Twingate.
GitHub
Use your GitHub credential to access Twingate.
GitHub
Use your GitHub credential to access Twingate.
GitHub
Use your GitHub credential to access Twingate.
Access Twingate via your LinkedIn login.
Access Twingate via your LinkedIn login.
Access Twingate via your LinkedIn login.
Microsoft Office 365
Leverage your Office 365 login credentials to access Twingate.
Microsoft Office 365
Leverage your Office 365 login credentials to access Twingate.
Microsoft Office 365
Leverage your Office 365 login credentials to access Twingate.
Infrastructure & Automation
Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.
Infrastructure & Automation
Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.
Infrastructure & Automation
Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.
Terraform
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.
Terraform
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.
Terraform
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.
New
Kubernetes
Deploy, define and manage Twingate directly from your Kubernetes deployment.
New
Kubernetes
Deploy, define and manage Twingate directly from your Kubernetes deployment.
New
Kubernetes
Deploy, define and manage Twingate directly from your Kubernetes deployment.
GitHub
Secure your workflows and Codespaces environments in a matter of minutes with Twingate.
GitHub
Secure your workflows and Codespaces environments in a matter of minutes with Twingate.
GitHub
Secure your workflows and Codespaces environments in a matter of minutes with Twingate.
GitLab
Bring Zero Trust to your GitLab CI/CD pipeline.
GitLab
Bring Zero Trust to your GitLab CI/CD pipeline.
GitLab
Bring Zero Trust to your GitLab CI/CD pipeline.
Pulumi
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.
Pulumi
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.
Pulumi
Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.
Chocolatey
Streamline Twingate deployments in Windows environments with Chocolatey.
Chocolatey
Streamline Twingate deployments in Windows environments with Chocolatey.
Chocolatey
Streamline Twingate deployments in Windows environments with Chocolatey.
Device Management & Security
Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.
Device Management & Security
Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.
Device Management & Security
Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.
CrowdStrike
Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.
CrowdStrike
Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.
CrowdStrike
Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.
SentinelOne
Bridge your device source of truth and network access management policies with SentinelOne and Twingate.
SentinelOne
Bridge your device source of truth and network access management policies with SentinelOne and Twingate.
SentinelOne
Bridge your device source of truth and network access management policies with SentinelOne and Twingate.
Microsoft Intune
Leverage Microsoft Intune data for trusted device Security Policies in Twingate.
Microsoft Intune
Leverage Microsoft Intune data for trusted device Security Policies in Twingate.
Microsoft Intune
Leverage Microsoft Intune data for trusted device Security Policies in Twingate.
Kandji
Add a layer of security to policy-based access controls with device posture checks from Kandji.
Kandji
Add a layer of security to policy-based access controls with device posture checks from Kandji.
Kandji
Add a layer of security to policy-based access controls with device posture checks from Kandji.
Jamf
Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.
Jamf
Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.
Jamf
Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.
New
1Password
Verify devices in Twingate using 1Password Device Trust
New
1Password
Verify devices in Twingate using 1Password Device Trust
New
1Password
Verify devices in Twingate using 1Password Device Trust
Hexnode
Streamline Twingate deployment and management via Hexnode.
Hexnode
Streamline Twingate deployment and management via Hexnode.
Hexnode
Streamline Twingate deployment and management via Hexnode.
Cloud Services
Bring ZTNA to your protected resources across the cloud.
Cloud Services
Bring ZTNA to your protected resources across the cloud.
Cloud Services
Bring ZTNA to your protected resources across the cloud.
AWS
Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.
AWS
Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.
AWS
Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.
Google Cloud Platform
Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.
Google Cloud Platform
Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.
Google Cloud Platform
Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.
Microsoft Azure
Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.
Microsoft Azure
Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.
Microsoft Azure
Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.
Render
Deploy seamless Zero Trust remote access for resources hosted in Render.
Render
Deploy seamless Zero Trust remote access for resources hosted in Render.
Render
Deploy seamless Zero Trust remote access for resources hosted in Render.
Oracle Cloud Infrastructure
Lightning fast ZTNA for your Oracle Cloud resources.
Oracle Cloud Infrastructure
Lightning fast ZTNA for your Oracle Cloud resources.
Oracle Cloud Infrastructure
Lightning fast ZTNA for your Oracle Cloud resources.
Civo
Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.
Civo
Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.
Civo
Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.
Digital Ocean
Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.
Digital Ocean
Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.
Digital Ocean
Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.
New
Coder
Securely access private resources directly from a Coder workspace.
New
Coder
Securely access private resources directly from a Coder workspace.
New
Coder
Securely access private resources directly from a Coder workspace.
Internet Security
Gain the security of DNS-level threat filtering without sacrificing speed or performance.
Internet Security
Gain the security of DNS-level threat filtering without sacrificing speed or performance.
Internet Security
Gain the security of DNS-level threat filtering without sacrificing speed or performance.
NextDNS
Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.
NextDNS
Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.
NextDNS
Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.
Cloudflare
Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.
Cloudflare
Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.
Cloudflare
Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.
DNSFilter
Secure your internet traffic with Twingate and DNSFilter.
DNSFilter
Secure your internet traffic with Twingate and DNSFilter.
DNSFilter
Secure your internet traffic with Twingate and DNSFilter.
Activity Monitoring & Incident Response
Gain a complete picture of network activity and reduce the blast radius of malicious actors.
Activity Monitoring & Incident Response
Gain a complete picture of network activity and reduce the blast radius of malicious actors.
Activity Monitoring & Incident Response
Gain a complete picture of network activity and reduce the blast radius of malicious actors.
New
Amazon S3
Automatically export Twingate log data to your Amazon S3 buckets.
New
Amazon S3
Automatically export Twingate log data to your Amazon S3 buckets.
New
Amazon S3
Automatically export Twingate log data to your Amazon S3 buckets.
Datadog
Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.
Datadog
Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.
Datadog
Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.
PagerDuty
Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.
PagerDuty
Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.
PagerDuty
Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.
Access Management
Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.
Access Management
Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.
Access Management
Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.
Slack
Enable self-serve access to different groups based on pre-defined security policies directly in Slack.
Slack
Enable self-serve access to different groups based on pre-defined security policies directly in Slack.
Slack
Enable self-serve access to different groups based on pre-defined security policies directly in Slack.
Opal
Implement dynamic access controls with Opal and Twingate.
Opal
Implement dynamic access controls with Opal and Twingate.
Opal
Implement dynamic access controls with Opal and Twingate.
ConductorOne
Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.
ConductorOne
Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.
ConductorOne
Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.
Indent
Request ephemeral and secure on-demand access using Indent and Twingate.
Indent
Request ephemeral and secure on-demand access using Indent and Twingate.
Indent
Request ephemeral and secure on-demand access using Indent and Twingate.
Compliance & Insurance
Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.
Compliance & Insurance
Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.
Compliance & Insurance
Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.
Coalition
Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.
Coalition
Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.
Coalition
Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.
Aptible
Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.
Aptible
Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.
Aptible
Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.
The VPN replacement your workforce will love.
Solutions
The VPN replacement your workforce will love.
Solutions
The VPN replacement your workforce will love.
Solutions