website/src/app/kb/use-cases/saas-app-access/readme.mdx
import PlanBadge from "@/components/PlanBadge"; import SupportOptions from "@/components/SupportOptions"; import Alert from "@/components/DocsAlert"; import Link from "next/link"; import Image from "next/image";
<PlanBadge plans={["starter", "team", "enterprise"]}>
In this guide, we'll use Firezone to manage access to a public SaaS application such as HubSpot or GitHub.
This is useful when you want to restrict access to a public web app based on an IP allowlist configured in the app, effectively turning the Firezone Gateway into an app connector for SaaS applications that support IP allowlists.
SaaS connectors. Create a Site if you
haven't already.Sites -> <site> and
click the Add Resource button.DNS as the Resource type.*.github.com. This
address must be resolvable by all of the Gateway(s) in your Site.TCP/80 and/or TCP/443 to
further limit access to this Resource to HTTP and/or HTTPS traffic only (Team
and Enterprise plans).Public GitHub access. This
will be used to identify the Resource in the Firezone admin portal.Policies tab, click the Add Policy button.You've now secured access to your private web app with Firezone. You can now test access from any signed-in Client by visiting the SaaS app in a web browser.
<SupportOptions />