Zero Trust is not achieved by a single product, nor is it a single specific component that magically solves this new way of handling access. It’s an approach and philosophy of “Never Trust, Always Verify” where instead of funneling all access controls to the organizations services through the firewall using VPN, each service is responsible for verifying the user, service or workload requesting access. Anything accessing a resource needs to first be authenticated and proof of that authentication needs to be verified. A token-based architecture aligns perfectly with this approach where an access token is presented as proof of identity and can easily be verified by the resource service. In this session we’ll explore what this approach looks like and the benefits that a token-based architecture brings to the game and how it can streamline the user experience.