Zero Trust made easy with Twingate integrations

Zero Trust made easy with Twingate integrations

Zero Trust made easy with Twingate integrations

Identity & Authentication

Streamline authentication, user management, and provisining through your existing identity provider (IdP).

Identity & Authentication

Streamline authentication, user management, and provisining through your existing identity provider (IdP).

Rippling

On our roadmap

Rippling

On our roadmap

Rippling

On our roadmap

Okta

Bridge identity management and policy-based access controls with Twingate and Okta.

Okta

Bridge identity management and policy-based access controls with Twingate and Okta.

Okta

Bridge identity management and policy-based access controls with Twingate and Okta.

Google Workspace

Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.

Google Workspace

Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.

Google Workspace

Connect your Google Workspace account for Single Sign-On (SSO) and user and group synchronization via SCIM provisioning.

Microsoft Azure Active Directory

Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.

Microsoft Azure Active Directory

Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.

Microsoft Azure Active Directory

Bring Zero Trust to your user directory with Twingate and Microsoft Azure Active Directory.

OneLogin

Leverage OneLogin for authentication and user group synchronization via SCIM.

OneLogin

Leverage OneLogin for authentication and user group synchronization via SCIM.

OneLogin

Leverage OneLogin for authentication and user group synchronization via SCIM.

Duo Security

Leverage Duo Security as an MFA application for Twingate-protected resources.

Duo Security

Leverage Duo Security as an MFA application for Twingate-protected resources.

Duo Security

Leverage Duo Security as an MFA application for Twingate-protected resources.

JumpCloud

Synchronize user accounts and delegate authentication with Twingate and JumpCloud.

JumpCloud

Synchronize user accounts and delegate authentication with Twingate and JumpCloud.

JumpCloud

Synchronize user accounts and delegate authentication with Twingate and JumpCloud.

Keycloak

Delegate user authentication to Keycloak via OIDC.

Keycloak

Delegate user authentication to Keycloak via OIDC.

Keycloak

Delegate user authentication to Keycloak via OIDC.

Google

Authenticate via your Google Account to access Twingate.

Google

Authenticate via your Google Account to access Twingate.

Google

Authenticate via your Google Account to access Twingate.

GitHub

Use your GitHub credential to access Twingate.

GitHub

Use your GitHub credential to access Twingate.

GitHub

Use your GitHub credential to access Twingate.

LinkedIn

Access Twingate via your LinkedIn login.

LinkedIn

Access Twingate via your LinkedIn login.

LinkedIn

Access Twingate via your LinkedIn login.

Microsoft Office 365

Leverage your Office 365 login credentials to access Twingate.

Microsoft Office 365

Leverage your Office 365 login credentials to access Twingate.

Microsoft Office 365

Leverage your Office 365 login credentials to access Twingate.

Infrastructure & Automation

Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.

Infrastructure & Automation

Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.

Infrastructure & Automation

Bring Zero Trust security up to DevOps speed with integrations for IaC providers, CI/CD pipelines, and service accounts.

Terraform

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.

Terraform

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.

Terraform

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Terraform Provider.

New

Kubernetes

Deploy, define and manage Twingate directly from your Kubernetes deployment.

New

Kubernetes

Deploy, define and manage Twingate directly from your Kubernetes deployment.

New

Kubernetes

Deploy, define and manage Twingate directly from your Kubernetes deployment.

GitHub

Secure your workflows and Codespaces environments in a matter of minutes with Twingate.

GitHub

Secure your workflows and Codespaces environments in a matter of minutes with Twingate.

GitHub

Secure your workflows and Codespaces environments in a matter of minutes with Twingate.

GitLab

Bring Zero Trust to your GitLab CI/CD pipeline.

GitLab

Bring Zero Trust to your GitLab CI/CD pipeline.

GitLab

Bring Zero Trust to your GitLab CI/CD pipeline.

Pulumi

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.

Pulumi

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.

Pulumi

Bring Zero Trust Network Access into your automated infrastructure configuration via Twingate’s Pulumi provider.

Chocolatey

Streamline Twingate deployments in Windows environments with Chocolatey.

Chocolatey

Streamline Twingate deployments in Windows environments with Chocolatey.

Chocolatey

Streamline Twingate deployments in Windows environments with Chocolatey.

Device Management & Security

Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.

Device Management & Security

Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.

Device Management & Security

Enforce device restrictions and posture checking with integrations for MDM providers and EDR solutions.

CrowdStrike

Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.

CrowdStrike

Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.

CrowdStrike

Leverage CrowdStrike to enforce device restrictions and posture checks with Twingate.

SentinelOne

Bridge your device source of truth and network access management policies with SentinelOne and Twingate.

SentinelOne

Bridge your device source of truth and network access management policies with SentinelOne and Twingate.

SentinelOne

Bridge your device source of truth and network access management policies with SentinelOne and Twingate.

Microsoft Intune

Leverage Microsoft Intune data for trusted device Security Policies in Twingate.

Microsoft Intune

Leverage Microsoft Intune data for trusted device Security Policies in Twingate.

Microsoft Intune

Leverage Microsoft Intune data for trusted device Security Policies in Twingate.

Kandji

Add a layer of security to policy-based access controls with device posture checks from Kandji.

Kandji

Add a layer of security to policy-based access controls with device posture checks from Kandji.

Kandji

Add a layer of security to policy-based access controls with device posture checks from Kandji.

Jamf

Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.

Jamf

Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.

Jamf

Configure Twingate Security Policies so that only Jamf-verified devices can sign into Twingate or access protected Resources.

New

1Password

Verify devices in Twingate using 1Password Device Trust

New

1Password

Verify devices in Twingate using 1Password Device Trust

New

1Password

Verify devices in Twingate using 1Password Device Trust

Hexnode

Streamline Twingate deployment and management via Hexnode.

Hexnode

Streamline Twingate deployment and management via Hexnode.

Hexnode

Streamline Twingate deployment and management via Hexnode.

Cloud Services

Bring ZTNA to your protected resources across the cloud.

Cloud Services

Bring ZTNA to your protected resources across the cloud.

Cloud Services

Bring ZTNA to your protected resources across the cloud.

AWS

Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.

AWS

Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.

AWS

Make Zero Trust remote access seamless and cost-effective when accessing to your private resources in AWS.

Google Cloud Platform

Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.

Google Cloud Platform

Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.

Google Cloud Platform

Simple and seamless Zero Trust remote access to Google Cloud (GCP) resources.

Microsoft Azure

Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.

Microsoft Azure

Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.

Microsoft Azure

Provide secure Zero Trust remote access to your Azure VNets and other Microsoft-managed resources.

Render

Deploy seamless Zero Trust remote access for resources hosted in Render.

Render

Deploy seamless Zero Trust remote access for resources hosted in Render.

Render

Deploy seamless Zero Trust remote access for resources hosted in Render.

Oracle Cloud Infrastructure

Lightning fast ZTNA for your Oracle Cloud resources.

Oracle Cloud Infrastructure

Lightning fast ZTNA for your Oracle Cloud resources.

Oracle Cloud Infrastructure

Lightning fast ZTNA for your Oracle Cloud resources.

Civo

Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.

Civo

Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.

Civo

Deploy fast, production-grade Kubernetes clusters completely firewalled off from the public Internet with Civo and Twingate.

Digital Ocean

Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.

Digital Ocean

Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.

Digital Ocean

Leverage Twingate’s direct connections while establishing a static IP via DigitalOcean.

New

Coder

Securely access private resources directly from a Coder workspace.

New

Coder

Securely access private resources directly from a Coder workspace.

New

Coder

Securely access private resources directly from a Coder workspace.

Internet Security

Gain the security of DNS-level threat filtering without sacrificing speed or performance.

Internet Security

Gain the security of DNS-level threat filtering without sacrificing speed or performance.

Internet Security

Gain the security of DNS-level threat filtering without sacrificing speed or performance.

NextDNS

Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.

NextDNS

Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.

NextDNS

Leverage Twingate’s DNS-over-HTTPS capability to provide DNS filtering and protection powered by NextDNS.

Cloudflare

Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.

Cloudflare

Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.

Cloudflare

Leverage Cloudflare for DNS filtering and DNS-over-HTTPS security features.

DNSFilter

Secure your internet traffic with Twingate and DNSFilter.

DNSFilter

Secure your internet traffic with Twingate and DNSFilter.

DNSFilter

Secure your internet traffic with Twingate and DNSFilter.

Activity Monitoring & Incident Response

Gain a complete picture of network activity and reduce the blast radius of malicious actors.

Activity Monitoring & Incident Response

Gain a complete picture of network activity and reduce the blast radius of malicious actors.

Activity Monitoring & Incident Response

Gain a complete picture of network activity and reduce the blast radius of malicious actors.

New

Amazon S3

Automatically export Twingate log data to your Amazon S3 buckets.

New

Amazon S3

Automatically export Twingate log data to your Amazon S3 buckets.

New

Amazon S3

Automatically export Twingate log data to your Amazon S3 buckets.

Datadog

Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.

Datadog

Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.

Datadog

Get real-time connection logging and monitoring with a ready-made dashboard directly in the Datadog platform.

PagerDuty

Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.

PagerDuty

Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.

PagerDuty

Receive instant notifications when a user faces an issue accessing any Twingate-protected resource.

Access Management

Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.

Access Management

Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.

Access Management

Take the manual pain out of access management with integrations for your IAM, dynamic access controls, and more.

Slack

Enable self-serve access to different groups based on pre-defined security policies directly in Slack.

Slack

Enable self-serve access to different groups based on pre-defined security policies directly in Slack.

Slack

Enable self-serve access to different groups based on pre-defined security policies directly in Slack.

Opal

Implement dynamic access controls with Opal and Twingate.

Opal

Implement dynamic access controls with Opal and Twingate.

Opal

Implement dynamic access controls with Opal and Twingate.

ConductorOne

Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.

ConductorOne

Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.

ConductorOne

Implement enhanced access controls and conduct comprehensive access reviews with Twingate and ConductorOne.

Indent

Request ephemeral and secure on-demand access using Indent and Twingate.

Indent

Request ephemeral and secure on-demand access using Indent and Twingate.

Indent

Request ephemeral and secure on-demand access using Indent and Twingate.

Compliance & Insurance

Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.

Compliance & Insurance

Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.

Compliance & Insurance

Meet the strictest requirements for SOC 2, HIPAA, GDPR, and more, with integrations across the compliance and insurance space.

Coalition

Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.

Coalition

Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.

Coalition

Bring together your cyber insurance and Zero Trust Network Access with Twingate and Coalition.

Aptible

Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.

Aptible

Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.

Aptible

Seamlessly meet strict compliance and regulatory requirements with Zero Trust remote access to Aptible services.