# AWS Verified Access Documentation

AWS Verified Access provides secure access to corporate applications without a VPN connection. It evaluates each request in real time and determines whether the user has access to the application.

- [User Guide](/verified-access/latest/ug): Describes key concepts for Verified Access and provides instructions for using the service.
- [API Reference](/AWSEC2/latest/APIReference/operation-list-verified-access.html): Describes the API operations for Verified Access.
- [EC2 section of the AWS CLI Reference](/cli/latest/reference/ec2/): Describes the AWS CLI commands for Verified Access.

---

## Related Links

- [Getting Started with AWS](https://aws.amazon.com/documentation/gettingstarted/)
- [AWS Training](https://aws.amazon.com/training/)
- [AWS Whitepapers](https://aws.amazon.com/whitepapers/)

