The Beneficiaries feature allows administrators to control which organizations can use a Secure Network server.
This is commonly used to:
-
Share Secure Network infrastructure across multiple organizations
-
Restrict access to specific Secure Network servers
What Are Beneficiaries?
Beneficiaries are organizations that are allowed to use a Secure Network server.
When an organization is added as a beneficiary:
-
Its users and devices can leverage the assigned Secure Network server
-
It can access resources according to configured policies
Common Use Cases
Managed Service Providers (MSPs)
-
Allow all sub-organizations to use a shared Secure Network server
-
Centralize Secure Network infrastructure across customers
Enterprise Environments
-
Assign different Secure Network servers to different business units or regions
-
Control access between environments (e.g., production vs development)
Configure Beneficiaries
-
Sign in to the ThreatLocker Portal.
-
Navigate to:
Network Policies > Hamburger Menu > Organization Beneficiaries -
Select the Secure Network server from the dropdown.
-
Add the organizations that should be allowed to use the server.
-
Your changes will be saved automatically.
How It Works
-
Each Secure Network server can be shared with one or more organizations
-
Only organizations listed as beneficiaries can use that server
-
Access is enforced when Secure Network (ZTNA) connections are established
Best Practices
-
Only add organizations that require access to the Secure Network server
-
Use separate servers for different environments (e.g., production, testing)
-
Regularly review beneficiary assignments to ensure proper access control
Help Center