{"id":45538,"date":"2025-12-22T08:32:30","date_gmt":"2025-12-22T13:32:30","guid":{"rendered":"https:\/\/netfoundry.io\/?p=45538"},"modified":"2025-12-22T08:47:42","modified_gmt":"2025-12-22T13:47:42","slug":"securing-ziti-identities-with-your-organizations-policies","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/","title":{"rendered":"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies"},"content":{"rendered":"\n<p>In an era where digital operations define business success, companies need more than just connectivity\u2014they need <strong>secure, controlled, and trusted connectivity<\/strong>. This is the vision NetFoundry delivers through its innovative <strong>Ziti platform<\/strong>, a zero-trust, identity-centric networking solution used by organizations around the world to secure applications, workloads, and devices without the complexity of traditional security tools.<\/p>\n\n\n\n<p>As businesses scale, so do their digital identities. Every user, device, application, API, or workload becomes part of your trust ecosystem. But maintaining compliance across all these identities can be overwhelming\u2014and a single non-compliant identity can put your business at risk.<\/p>\n\n\n\n<p>This can be addressed by leveraging the <a href=\"https:\/\/developer.netfoundry.io\/\">NetFoundry APIs<\/a> in combination with custom code and cloud-native tools to manage identities and automatically trigger actions based on their compliance status.<\/p>\n\n\n\n<p>Okay \u2014 let\u2019s see how it works in the real world<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Overview\">Overview<\/h3>\n\n\n\n<p>Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence. Ingest these identities into Cosmos DB or AWS databases for centralized storage and management. Run compliance actions automatically on any changes detected in Cosmos DB by leveraging Azure Functions to maintain up-to-date enforcement and monitoring.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Architecture-Overview\">Architecture Overview<\/h3>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>If the Wazuh server (XDR) detects an endpoint as non-compliant, the Wazuh agent on that endpoint executes code.<\/li>\n\n\n\n<li>When the Wazuh agent runs code, it extracts all identity information from WDE and sends it to CosmosDB for centralized storage.<\/li>\n\n\n\n<li>A change in CosmosDB triggers an Azure Function app.<\/li>\n\n\n\n<li>The code runs in a Docker container within the Function app. When triggered, it collects the latest identity information from CosmosDB and sends a POST request to MOP via API to disable the identities.<\/li>\n\n\n\n<li>Upon receiving the signal, MOP disables the identities on the controller for the specified duration<\/li>\n<\/ol>\n\n\n\n<p>The result: Stronger security, smoother operations, and greater confidence in every connection your business depends on. It provides a layer of protection that works silently in the background, ensuring your operations stay secure without adding complexity for your teams.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1.-Always-On-Oversight\"><strong>1. Always-On Oversight<\/strong><\/h4>\n\n\n\n<p>Instead of periodic audits or manual reviews, Ziti Compliance Check continuously monitors every identity. This ensures that risk is always minimised, with no dependency on human effort or timing.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2.-Immediate-Risk-Reduction\"><strong>2. Immediate Risk Reduction<\/strong><\/h4>\n\n\n\n<p>When a non-compliant identity is detected, the system responds instantly\u2014preventing potential threats from escalating. Identities are automatically disabled until they meet your organization\u2019s standards.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3.-Centralized-Visibility\"><strong>3. Centralized Visibility<\/strong><\/h4>\n\n\n\n<p>Business leaders and IT teams gain a unified, real-time view of compliance across the organization. This improves decision-making, simplifies reporting, and creates transparency across business units.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"4.-Designed-for-Modern-Cloud-Environments\"><strong>4. Designed for Modern Cloud Environments<\/strong><\/h4>\n\n\n\n<p>Whether your operations run on AWS, Azure, or hybrid cloud setups, Ziti Compliance Check integrates seamlessly, supporting your digital transformation strategies without disruption.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Why-Identity-Compliance-Is-a-Business-Imperative\"><strong>Why Identity Compliance Is a Business Imperative<\/strong><\/h3>\n\n\n\n<p>Cyber threats have evolved, and so have the expectations of regulators, customers, and partners. A single non-compliant identity can expose an organisation to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Costly data breaches<\/li>\n\n\n\n<li>Interruptions in service delivery<\/li>\n\n\n\n<li>Brand and reputational damage<\/li>\n\n\n\n<li>Legal or regulatory penalties<\/li>\n<\/ul>\n\n\n\n<p>For business leaders, this means compliance isn\u2019t just an IT responsibility\u2014it\u2019s a strategic requirement.<\/p>\n\n\n\n<p>You can leverage the flexibility provided by NetFoundry to bridge this gap by ensuring that every identity interacting with your business systems is trusted, up to date, and fully aligned with your security policies.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"The-Business-Value:-What-Leaders-Gain\"><strong>The Business Value: What Leaders Gain<\/strong><\/h3>\n\n\n\n<p>Beyond improved security, this approach delivers measurable value across operations and governance.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"Reduced-Operational-Risk\"><strong>Reduced Operational Risk<\/strong><\/h4>\n\n\n\n<p>Automated compliance removes blind spots, minimizes identity-related vulnerabilities, and keeps unauthorized access at bay.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"Lower-Resource-Burden\"><strong>Lower Resource Burden<\/strong><\/h4>\n\n\n\n<p>Your teams no longer need to manually track, validate, or deactivate non-compliant identities. Time saved can be redirected toward innovation and high-impact initiatives.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"Stronger-Regulatory-Alignment\"><strong>Stronger Regulatory Alignment<\/strong><\/h4>\n\n\n\n<p>By ensuring consistent compliance, organizations stay audit-ready and can prove adherence to security frameworks with confidence.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"Enhanced-Customer-&amp;-Partner-Trust\"><strong>Enhanced Customer &amp; Partner Trust<\/strong><\/h4>\n\n\n\n<p>Demonstrating robust, automated identity compliance reinforces your commitment to security\u2014strengthening stakeholder relationships and brand credibility.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an era where digital operations define business success, companies need more than just connectivity\u2014they need secure, controlled, and trusted connectivity. This is the vision NetFoundry delivers through its innovative Ziti platform, a zero-trust, identity-centric networking solution used by organizations around the world to secure applications, workloads, and devices without the complexity of traditional security [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":45539,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[471,488,486],"tags":[985,890,545],"class_list":["post-45538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-netfoundry-sdk-apis","category-ziti-openziti","tag-identities","tag-netfoundry","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Ziti Identities with your Organization&#039;s Policies<\/title>\n<meta name=\"description\" content=\"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies\" \/>\n<meta property=\"og:description\" content=\"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T13:32:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T13:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1062\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Girish Reddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Girish Reddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/\"},\"author\":{\"name\":\"Girish Reddy\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/d9f2897a26b2d6bd520bfcc3c979805c\"},\"headline\":\"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies\",\"datePublished\":\"2025-12-22T13:32:30+00:00\",\"dateModified\":\"2025-12-22T13:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/image-6.png\",\"keywords\":[\"identities\",\"NetFoundry\",\"Zero Trust\"],\"articleSection\":[\"Azure\",\"NetFoundry SDK &amp; APIs\",\"Ziti &amp; OpenZiti\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/\",\"name\":\"Securing Ziti Identities with your Organization's Policies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/image-6.png\",\"datePublished\":\"2025-12-22T13:32:30+00:00\",\"dateModified\":\"2025-12-22T13:47:42+00:00\",\"description\":\"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/image-6.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/image-6.png\",\"width\":1920,\"height\":1062},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/netfoundry-sdk-apis\\\/securing-ziti-identities-with-your-organizations-policies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/d9f2897a26b2d6bd520bfcc3c979805c\",\"name\":\"Girish Reddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g\",\"caption\":\"Girish Reddy\"},\"honorificPrefix\":\"Mr\",\"birthDate\":\"1992-07-17\",\"gender\":\"male\",\"jobTitle\":\"Sr Technical Support Engineer\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/girishkumar-reddy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Ziti Identities with your Organization's Policies","description":"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/","og_locale":"en_US","og_type":"article","og_title":"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies","og_description":"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.","og_url":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2025-12-22T13:32:30+00:00","article_modified_time":"2025-12-22T13:47:42+00:00","og_image":[{"width":1920,"height":1062,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png","type":"image\/png"}],"author":"Girish Reddy","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Girish Reddy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/"},"author":{"name":"Girish Reddy","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/d9f2897a26b2d6bd520bfcc3c979805c"},"headline":"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies","datePublished":"2025-12-22T13:32:30+00:00","dateModified":"2025-12-22T13:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/"},"wordCount":650,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png","keywords":["identities","NetFoundry","Zero Trust"],"articleSection":["Azure","NetFoundry SDK &amp; APIs","Ziti &amp; OpenZiti"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/","url":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/","name":"Securing Ziti Identities with your Organization's Policies","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png","datePublished":"2025-12-22T13:32:30+00:00","dateModified":"2025-12-22T13:47:42+00:00","description":"Detect and handle non-compliant Ziti identities effectively to ensure security and policy adherence.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/12\/image-6.png","width":1920,"height":1062},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/netfoundry-sdk-apis\/securing-ziti-identities-with-your-organizations-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Securing Ziti Identities in Alignment with Your Organization\u2019s Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/d9f2897a26b2d6bd520bfcc3c979805c","name":"Girish Reddy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0533155f879d99d00e36bcc376258e25931f5b520c06b686d8372c2b112fece?s=96&d=mm&r=g","caption":"Girish Reddy"},"honorificPrefix":"Mr","birthDate":"1992-07-17","gender":"male","jobTitle":"Sr Technical Support Engineer","url":"https:\/\/netfoundry.io\/author\/girishkumar-reddy\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/45538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=45538"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/45538\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/45539"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=45538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=45538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=45538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}