An identity-based Zero Trust Architecture is the only way to deliver secure access to resources and workforces distributed far beyond the office walls. This modern security paradigm never assumes that a user, device, or network can be trusted due to the increasing number of modern security threats. To mitigate this, every incoming connection request must be verified explicitly and users' identities confirmed, which is known as Zero Trust Authentication. The principle of "assume breach" lies at the heart of Zero Trust and informs its approach to authentication and authorization, including Zero Trust Authorization based on the principle of least privilege, limiting access to verified users to the bare minimum they need to do their work. Identity Providers play a critical role in making this modern security paradigm work across today's distributed networks by creating a single federated identity that applies to on-premises and cloud-based resources. However, while identity is essential, it is only one element in a Zero Trust Architecture, which also considers context and device posture when implementing least privileged access policies. Twingate offers a secure access solution that makes Zero Trust as simple as possible for every stakeholder, including transparent client apps and browser-based consoles to enforce security policies without user involvement.