Cloud Application Gateway

Secure, software‑defined connectivity for Omada Identity Cloud

Bring every app and system into identity governance without opening inbound firewalls

The Cloud Application Gateway (CAG) delivers cloud-native connectivity aligned to Zero Trust with customer-controlled encryption keys and lightning-fast deployment.

What is the Cloud Application Gateway?

The Cloud Application Gateway is a lightweight, software-defined service purpose-built to extend identity governance across distributed environments. It establishes secure outbound HTTPS sessions only when needed, avoiding complex firewall changes or persistent tunnels. It updates automatically to reduce maintenance and ensure future compatibility. Compared to competing solutions, it delivers faster time-to-value, lower operating overhead, and stronger security with customer-controlled encryption keys.

omada cloud application gateway

How does the Cloud Application Gateway benefit my organization?

flexible by design

Flexible by design

Deploy CAG alongside the systems you need to govern. Run on your preferred OS, hypervisor, or in containers. It is flexible and extensible across environments. Rollout is simple and automatic updates keep operational overhead low.

built for zero trust

Built for Zero Trust

Avoid broad network exposure. CAG provides application and identity level access only when needed, minimizing attack surfaces and ensuring consistent policy enforcement across hybrid application and infrastructure

your keys your control

Your keys, your control

Use your own private encryption keys stored in your vault. Secrets remain encrypted with keys only you manage, reinforcing a zero knowledge posture and ensuring full compliance with your governance and security standards

Cloud Application Gateway capabilities

  1. CAG eliminates the need for inbound firewall changes by initiating outbound-only HTTPS connectivity. This makes onboarding faster while avoiding the complexity of tunnels or manual routing. It runs anywhere you need it: in data centers, on cloud infrastructure, or in lightweight containers like Docker. Containerized deployments bring unmatched speed and agility, allowing organizations to spin up gateways quickly, scale elastically, and adapt to shifting needs without heavy infrastructure.
  2. CAG strengthens security by advancing Zero Trust. Instead of broad network exposure, it grants identity- and application-level access only when required. This approach minimizes the attack surface and closes visibility gaps, ensuring consistent policy enforcement across hybrid environments.
  3. CAG reinforces data protection through strong encryption. It keeps secrets safe while improving access visibility. Combined with context-aware RBAC and auditing at the application and identity level, it addresses limited visibility and maintains a zero-knowledge posture.

How do the VPN and the Cloud Application Gateway differ?

Both models provide secure connectivity for Omada Identity Cloud connectors, but each serves different needs.


When CAG is right for you

CAG is the right fit when agility and simplicity matter most. It enables rapid onboarding without complex firewall reconfiguration using secure outbound-only sessions that work anywhere. Ideal for organizations adopting Zero Trust, it limits access to what’s needed, reduces risk, and scales easily across hybrid environments. For teams that want control of encryption keys and low operational overhead, CAG is the natural choice.


When a VPN is right for you

VPNs are best suited for organizations with an established network infrastructure and strict regulatory requirements that mandates perimeter-based security enforcement. They provide benefits such as centralized control, IPsec logging, and strict routing isolation. If your environment depends on rigid segmentation and your team can manage tunnels and firewall changes, VPNs remain a dependable option.


 

FeatureCloud Application GatewayVPN
Setup complexityLowModerate to high
Zero Trust alignmentHighLow
EncryptionEnd-to-end encryptionEncrypted in the VPN stack
Network changes requiredNoYes
Scaling across sitesFastNetwork dependent
Perimeter controlIdentity level trustNetwork perimeter
Ideal use casesAgile, hybrid environmentsEstablished perimeter, regulated environments

Let's Get
Started

Let us show you how Omada can enable your business.