It can’t see who’s knocking until it’s too late. Identity-Aware Proxy (IAP) changes that. It puts a checkpoint in front of every request, verifying identity before a single packet touches your service. But discoverability—making private services reachable without making them vulnerable—is the hard part.
Most teams think "expose or hide"is the choice. It’s not. With the right design, you can make internal endpoints discoverable only to those who should see them, and invisible to everyone else. This is discoverability in Identity-Aware Proxy done right: a private universe with a map only for the right people.
An Identity-Aware Proxy with discoverability built in does three key things:
- Identity-first access control – Every connection starts with identity, not IP, not VPN, not guesswork. The proxy challenges the user or service immediately.
- Selective exposure – Services register with the proxy but remain hidden to anyone who does not have the right credentials. They don’t exist from the perspective of unauthorized scans or crawlers.
- Granular policy at the edge – The logic isn’t buried deep inside your stack; it lives at the perimeter where it is hardest to bypass.
Without discoverability, IAP becomes frustrating—users can’t find internal tools or APIs unless they already know the URLs. Without IAP, discoverability becomes dangerous—every endpoint is a point of attack. Together, discoverability and identity-aware access make access seamless for the right people and impossible for the wrong ones.