All Products
Search
Document Center

Secure Access Service Edge:Cloud-native applications

Last Updated:Mar 31, 2026

SASE gives cloud-native applications private network access without exposing public IP addresses. By combining zero-trust policies with centralized endpoint management, only authenticated users can reach your cloud databases, middleware, and developer tools — SASE proxies all traffic.

How it works

SASE establishes an outbound private channel between your cloud-native applications and authorized users. Instead of exposing a public IP, each application is reachable exclusively through the SASE client, which enforces identity-, device-, and environment-based authentication before granting access. This achieves two goals: stealth access (resources are invisible to the public internet) and least privilege (access is granted only to what each user needs).

image

Supported cloud-native applications

SASE currently supports the following application categories:

CategoryApplicationsBest for
Cloud Database (ApsaraDB)RDS, PolarDB, Tair (Redis OSS-compatible), Lindorm, MongoDB, AnalyticDB for MySQL, AnalyticDB for PostgreSQL, ClickHouse, ClickHouse Enterprise Edition, SelectDB, PolarDB for Xscale, DMS, and DASSecuring database access without public IPs
Cloud MiddlewareRocketMQ 5.0, Kafka, MSE registry, and MSE cloud-native gatewayProtecting message queues and service registries
Developer ToolsAlibaba Cloud Management Console and Alibaba Cloud DevOpsRestricting internal tooling to authenticated users

Prerequisites

Before you begin, ensure that you have:

Important

Configure zero-trust policies before disabling public access for any application. After public access is disabled, all public connections are blocked — this action is irreversible. However, applications can still be accessed through SASE.

View and manage cloud-native applications

  1. Log on to the Secure Access Service Edge console.

  2. In the left navigation pane, choose Private Access > Network Settings.

  3. On the Services on Alibaba Cloud > Cloud-native Application tab, you can view the cloud-native applications that SASE supports, organized by category.

  4. In the All Cloud Apps area on the left, click a cloud-native application to view its details and perform the following operations.

    image

    • Enable application access: Toggle the switch in the Application Connection column.

    • View Internet exposure threats: Check the Internet Exposure Risk column to see any exposed public IP addresses.

    • Reduce public access: If an application has an exposed public IP address, click Not Disabled in the Actions column to disable public access.

    Note

    For some cloud products, security policies or product limitations prevent direct disabling of public access. In these cases, go to the console of the corresponding cloud product to configure blacklists and whitelists, or adjust the configuration to reduce public exposure.

What's next