You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/eskemm-numerique-multi-tenant-remote-access.mdx
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,11 +7,10 @@ author: "Michał Gryczka"
7
7
companyName: "Eskemm Numérique"
8
8
companyDescription: "French public company responsible for delivering hosted services to universities and research institutions across the Brittany region, operating a shared infrastructure platform for multiple universities and laboratories."

@@ -64,31 +63,31 @@ Real-time client configuration synchronisation guarantees that any changes to lo
64
63
65
64
In the second scenario, the requirement was to securely connect multiple clients to centralized resources and guarantee that each client has access only to specific services.
66
65
67
-
To support this case, Eskemm deployed a **dedicated Location for shared services** accessible to all authorized customers. This setup introduces a higher risk profile, because multiple clients must access only selected infrastructure without access to all other network segments and seeing each other's workloads.
66
+
To support this case, Eskemm Numérique deployed a **dedicated Location for shared services** accessible to all authorized customers. This setup introduces a higher risk profile, because multiple clients must access only selected infrastructure without access to all other network segments and seeing each other's workloads.
68
67
69
68
Currently, access is limited to only a few services. To enhance that, Pierre and Marc plan to leverage **granular group-based access control** (RBAC capabilities of Defguard). While User Groups currently control who can enter this shared gateway on a higher level, they will implement firewall rules using Defguard's **Access Control Lists (ACLs)** module built into Defguard to precisely define access to specific services (IPs, ports and protocols). [ACLs documentation](https://docs.defguard.net/enterprise/all-enteprise-features/access-control-list).
70
69
71
70
The expected result—a simple but powerful way to control access to shared resources based on user identity and organisation privileges.
72
71
73
72
### Authentication
74
73
75
-
Defguard enabled Eskemm to introduce **MFA for several VPN locations** on connection level, while providing flexibility of configuration and authentication via TOTP codes. Defguard also supports **biometric authentication** using Defguard clients on mobile devices.
74
+
Defguard enabled Eskemm Numérique to introduce **MFA for several VPN locations** on connection level, while providing flexibility of configuration and authentication via TOTP codes. Defguard also supports **biometric authentication** using Defguard clients on mobile devices.
76
75
77
76
This was a major factor for choosing Defguard as it's the only solution that delivers **MFA authentication for WireGuard VPN** in a self-hosted environment. It guarantees full data privacy and no third-party dependencies.
78
77
79
78
### Security & Compliance
80
79
81
-
The compliance and security requirements are imposed on Eskemm through **HDS (Hébergeur de Données de Santé)**—a mandatory certification in France for any organization hosting health data on behalf of third parties, such as hospitals, clinics, or medical professionals.
80
+
The compliance and security requirements are imposed on Eskemm Numérique through **HDS (Hébergeur de Données de Santé)**—a mandatory certification in France for any organization hosting health data on behalf of third parties, such as hospitals, clinics, or medical professionals.
82
81
83
82
Defguard's "Secure By Design" approach and **segmented architecture** that cleanly separates the Control Plane (Core) from the Data Plane fulfils those strict regulatory requirements.
84
83
85
-
Its design allows Eskemm to host the Core within their own secure datacenter, keeping it **completely hidden from the public internet**. As a result, all sensitive metadata remains strictly within French/EU jurisdiction, fully satisfying HDS and ISO 27001 standards.
84
+
Its design allows them to host the Core within their own secure datacenter, keeping it **completely hidden from the public internet**. As a result, all sensitive metadata remains strictly within French/EU jurisdiction, fully satisfying HDS and ISO 27001 standards.
86
85
87
-
The fact that Defguard is a Polish company and the product is developed in the European Union makes it a preferable choice for Eskemm and companies that want to build a **sovereign technology stack**.
86
+
The fact that Defguard is a Polish company and the product is developed in the European Union makes it a preferable choice for organisation and companies that want to build a **sovereign technology stack**.
88
87
89
88
### Automation & API
90
89
91
-
Managing gateways manually would slow down recovery and increase configuration errors. Eskemm therefore managed gateway deployment and Defguard configuration **through code** using **Ansible and Terraform**.
90
+
Managing gateways manually would slow down recovery and increase configuration errors. The team at Eskemm Numérique therefore managed gateway deployment and Defguard configuration **through code** using **Ansible and Terraform**.
92
91
93
92
By integrating Defguard's **API** into these pipelines, the team established a reproducible deployment strategy, ensuring that new gateways are provisioned instantly without manual input. Furthermore, the system automatically propagates changes to user devices, making infrastructure updates almost transparent while maintaining strict consistency across all clients.
94
93
@@ -100,7 +99,7 @@ For most users, the change was almost invisible—which would not have been poss
100
99
101
100
## Result
102
101
103
-
By deploying Defguard as a centralized platform integrated with their automation stack, Eskemm achieved significant gains in security, operations, and scalability:
102
+
By deploying Defguard as a centralized platform integrated with their automation stack, Eskemm Numérique achieved significant gains in security, operations, and scalability:
104
103
105
104
- Passed penetration tests and maintained **HDS and ISO 27001 certifications**.
0 commit comments