How Twingate Works
Twingate's architecture ensures that no single component can independently authorize traffic flow to a resource. User access and data flow require confirmation from at least two components, providing an added layer of security.
Identity Provider
Environment Type
Legend
Twingate component managed by Twingate
Twingate component managed by customer