Securing Cloud Applications With Identity Aware Proxy Using Zero-Trust ||