An Identity-Aware Proxy (IAP) controls which requests enter your internal systems. It checks identity before allowing network access, often sitting in front of applications, APIs, and private admin tools. When working with an IAP, the internal port is more than a number—it determines where traffic lands inside your infrastructure after identity verification.
An Identity-Aware Proxy internal port is the destination port on the protected resource. This is the port the IAP connects to once a request has passed authentication and authorization. If your backend app listens on port 8080, the IAP must be configured to forward approved traffic to that port. Misalignment here causes failed connections or unintended exposure.
Identity-Aware Proxy internal port settings matter for:
- Routing requests correctly to backend services.
- Maintaining separation between public and internal ports.
- Enforcing zero-trust patterns by isolating service entry points.
- Supporting multi-tenant or multi-service deployments with distinct internal port mappings.
When the IAP receives a request, it binds to a public endpoint—a URL or IP+port—and checks the identity of the client. After granting access, it forwards the connection to the internal port defined in your configuration. The internal port is not exposed to the public internet; it should only be reachable through the proxy. Secure configurations often use firewall rules to allow traffic to the internal port only from the IAP’s IP range.