All Products
Search
Document Center

Secure Access Service Edge:Best practices for accessing cloud-native applications using SASE

Last Updated:Dec 25, 2025

Secure Access Service Edge (SASE) connects to your cloud-native application resources, allowing you to view and manage their public endpoints. To improve security, you can disable public network access if your business permits. This action restricts application access to the virtual private cloud (VPC) internal network. This topic describes how to access cloud-native applications over a private network and how to disable public network access.

Prerequisites

Supported cloud-native applications

  • Cloud Database (ApsaraDB): RDS, PolarDB, Tair (Redis OSS-compatible), Lindorm, MongoDB, AnalyticDB for MySQL, AnalyticDB for PostgreSQL, ClickHouse, ClickHouse Enterprise Edition, SelectDB, PolarDB for Xscale, DMS, Bastionhost, and DAS.

  • Cloud Middleware: RocketMQ 5.0, Kafka, MSE registry, and MSE cloud-native gateway.

  • Developer Tools: Alibaba Cloud Management Console and Alibaba Cloud DevOps.

Configure private network access for cloud-native applications

Private network access uses Software-Defined Perimeter (SDP) technology and provides zero trust network access as a Software as a Service (SaaS) solution. The SASE solution allows your employees to securely access cloud resources without exposing public addresses or changing your network architecture. SASE also provides precise control over access permissions.

Step 1: Configure an identity source

Identity sources are used to provide identity authentication for your employees. SASE supports both third-party and self-managed identity authentication systems, such as LDAP, DingTalk, WeCom, Lark, IDaaS, and custom identity sources. If your business uses multiple identity sources, you can configure all of them. This lets you use the SASE service with your various identity sources.

This topic uses a custom identity source as an example to demonstrate the feature.

  1. Log on to the Secure Access Service Edge console.

  2. In the navigation pane on the left, choose Identity Authentication > Identity Access.

  3. On the Identity synchronization tab, find Custom IdP and click Edit in the Actions column. Follow the configuration wizard to configure the custom identity source. For more information, see Configure SASE identity sources.

Step 2: Configure a user group

When you configure an access policy, you must specify the user group to which it applies.

  1. In the navigation pane on the left, choose Identity Authentication > Identity Access.

  2. On the User Group Management tab, click Create User Group.

  3. In the Create User Group panel, configure the parameters for the user group, such as Organizational Structure, Account Name, Email Address, and Mobile Phone Number. Then, click OK. For more information, see User group management.

Step 3: Enable network connection

  1. In the navigation pane on the left, choose Private Access > Network Settings.

  2. On the Network Settings page, on the Services on Alibaba Cloud > CEN Instance tab, view the network resources that are synced by SASE.

  3. Find the target CEN instance or a VPC-connected instance associated with the CEN instance. Turn on the Network Connection switch.

  4. In the Network Connection dialog box, select Enable Network Connection for All Cloud Applications or Custom Connection to Cloud Applications.

    image

    • Enable Network Connection for All Cloud Applications: After you select this option, all cloud applications are automatically connected. Non-cloud applications can be connected by configuring ACL rules. Cloud applications that are created in the VPC later are also connected by default.

      Note

      Currently, only some cloud-native applications of cloud databases are supported. You can view the supported cloud application types on the Services on Alibaba Cloud > Cloud-native Application tab by checking the Application Type.

    • Custom Connection to Cloud Applications:

      • Select Custom Connection to Cloud Applications and click OK.

      • In the Custom Connection to Cloud Applications panel, select the cloud database instances that you want to connect and click OK.

Step 4: Create a private application

Before you use SASE for private access, you must add the IP address or domain name of your business application to SASE. Employees can access only the business applications that you have added to the SASE app.

  1. Log on to the Secure Access Service Edge console.

  2. In the navigation pane on the left, choose Private Access > Application Management.

  3. Click Add Application. In the Add Application panel, on the Manual Configuration tab, configure the parameters as described in the following table.

    Configuration Item

    Description

    Example

    Application Name

    The name of the application.

    The name must be 2 to 100 characters in length and can contain letters, digits, hyphens (-), underscores (_), and periods (.).

    Cloud-native Application

    Status

    The status of the application. Valid values are Enabled and Disabled.

    Enable

    Access Mode

    Select an access mode.

    • Client-based Access: Users must install the SASE app to access business applications. This mode supports access to Layer 4 and Layer 7 applications for both regular work and O&M tasks. It also supports a wide range of endpoint security detection and control policies.

    • Browser-based Access: Users can access your web applications through a browser without installing the SASE app. This mode does not support endpoint security detection and control policies.

    Client-based Access

  4. Click Next. Configure the Application Address, Port, and Protocol for the application, and then click OK.

    To trace application access, enable the Web Application Access Reinforcement feature. Select Access Tracing, choose the field name to add to the HTTP header, and then fetch it from your business service.

    image

Step 5: Create a zero trust policy

  1. In the navigation pane on the left, choose Private Access > Access Control.

  2. On the Zero Trust Policies tab, click Create Policy.

  3. In the Create Policy panel, configure the policy to allow specified users to access the cloud-native application. Then, click OK.

    image

Step 6: Verify the configuration

  1. Open the SASE app that you installed.

  2. Enter the enterprise verification ID and click OK.

    You can log on to the Secure Access Service Edge console. In the navigation pane on the left, on the Settings page, obtain the Enterprise Authentication Identifier.

  3. Log on with the initial account name and password that you received in an email or text message.

  4. Click Connect To Intranet.

  5. Access the private application. If you can access the application, the configuration is successful.

Disable public network access for the cloud-native application

  1. In the navigation pane on the left, choose Private Access > Network Settings.

  2. On the Services on Alibaba Cloud > Cloud-native Application tab, view the application types that support disabling public network access and the list of instances for which network connection is enabled.

  3. For an instance that is exposed to the Internet, click Not Disabled in the Actions column.

  4. In the Disable dialog box, make a selection in the Select the public endpoint for which you want to disable access. section, and then click OK.

    Important

    After you disable this feature, all public network access is denied. This action converges access points and improves security. This operation is irreversible. You can still access the application through SASE. Ensure that you have configured and enabled zero trust policies for all cloud applications.

  5. Attempt to access the cloud application using its public address. If the attempt fails, the configuration is successful.