Prisma Access Agent for Linux provides zero trust network access for various Linux
distributions with comprehensive traffic steering and centralized management
capabilities.
Organizations need consistent zero trust network access (ZTNA) across all endpoints,
but Linux desktop environments often present integration challenges.
Prisma® Access Agent for Linux addresses
this by extending ZTNA capabilities to Linux desktop environments, supporting
Ubuntu, Fedora, Arch Linux, and Debian distributions on both x86_64 and 64-bit ARM
architectures with kernel versions 5.15 and higher. You can deploy the agent using a
portable installation method that eliminates dependency conflicts and works across
different Linux configurations without requiring package manager modifications.
The agent provides comprehensive traffic steering to enforce split-tunnel policy
rules and forwarding profiles based on applications, domains, or IP addresses. Users
can authenticate using Security Assertion Markup Language (SAML) through their
system default browsers. The agent operates in user interface (UI) mode for desktop
environments accompanied by a limited command-line interface (CLI) for automated
deployments and troubleshooting. The feature provides configuration support to Linux
endpoints on Strata Cloud Manager Managed Prisma Access as well as Panorama® Managed
Prisma Access and Panorama Managed NGFW deployments. You can configure agent
settings based on match criteria for Linux agents directly through the management
interface, enabling consistent identity management across your deployment.
You benefit from unified management through existing Prisma Access Agent endpoint
management infrastructure, host information profile (HIP) reporting for endpoint
compliance, and comprehensive logging capabilities. The Endpoint Management page
provides Linux-specific device filtering and inventory management, allowing you to
organize and monitor Linux endpoints according to your operational requirements. You
can also download Linux agent installation packages directly from Endpoint
Management.
Organizations with significant Linux desktop deployments can now extend their zero
trust security posture to these critical endpoints while maintaining consistent
security enforcement across mixed operating system environments.