Introduction
Zscaler Overview
Zscaler (Nasdaq: ZS), enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) services create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler delivers its services 100% in the cloud and offers the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions can’t match. Used in more than 185 countries, Zscaler operates a massive, global cloud security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss. For more information on Zscaler, visit www.zscaler.com or follow Zscaler on Twitter @zscaler.
About This Guide
This guide provides information on how to:
- Set up Beyond Identity as a passwordless authentication solution for your Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) services.
- Set up Beyond Identity to enforce corporate Zero Trust policies by using Zscaler Mobile Portal APIs.
Notes
- For passwordless authentication, the customer may decide to integrate Zscaler with Beyond Identity, either directly or via their existing SSO. This document describes the direct integration between Zscaler and Beyond Identity. For integration via SSO, please contact Beyond Identity.
- Zscaler’s direct integration with Beyond Identity is applicable to Zscaler Client Connector for ZIA and ZPA, and ZPA Admin Console. It’s not applicable to ZIA Admin Console because ZIA Admin Console does not support SP-initiated SAML flow and Beyond Identity does not support IdP-initiated SAML flow.
- Both ZIA and ZPA Provisioning is supported with SCIM supported directory or SSO while supporting Authentication directly with Beyond Identity as the IdP.
Prerequisites
Ensure that you have the following:
- A Zscaler account with “Super” admin privileges to configure SAML IdP.
- Zscaler Mobile APIs enabled for your tenant (mobileadmin.<Zscaler cloud>.net). Look for Administration tab and “Public API” on the left side menu.
ZPA Admin Authentication Configuration
To configure Beyond Identity as the IdP for ZPA Admin Login, follow the steps below. Once these steps are taken, you will be ready to enable Beyond Identity for Admin Login to ZPA Console.
- Sign into the ZPA Admin Console as Administrator.
- In the side menu select “Administration” -> “IdP Configuration”.
- On the IdP configuration tab select the Add IdP Configuration blue plus sign.
- In the IdP Information tab provide following Information.
- Name: Beyond Identity Admin SSO
- Single Sign-on: Select “Admin”.
- Pick the correct certificate for the Admin SP Certificate Rotation
- Domains: Select the appropriate domain from the pull-down menu.
- Click Next.
- On the SP Metadata Tab download Service Provider Metadata to be used in the following steps and Click on Next.
- Once logged into Beyond Identity Admin Console UI, click on “Integrations” tab and then click on SAML tab and then click on “SAML Connections”. Click on “Add SAML Connection” and update the fields as following:
- Upload “SP Metadata” xml file downloaded in the previous step.
- Name: “Zscaler Private Access Admin SSO”
- Click on “Save Changes”.
- Note down the following fields from the recently created SAML Connection. This will be required in the next step.
- IdP Id (Beyond Identity Connection ID)
- IdP Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso
- IdP Issuer: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml
- Download IdP Signature Certificate
- Switching back to Zscaler Private Access Admin Console, on the IdP Configuration tab configure following fields.
- IdP Certificate (Downloaded in previous step)
- Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso (Recorded in the previous step)
- IdP Entity ID: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml (Recorded in the previous step)
- Status: Enabled
- HTTP-Redirect: Enabled
- ZPA (SAML) Request: Signed
- Click on Save.
ZPA USER Authentication Configuration
To configure Beyond Identity as the IdP for ZPA User Login, follow the steps below. Once these steps are taken, you will be ready to enable Beyond Identity for User Login to ZPA Client Connector.
- Sign into the ZPA Admin Console as Administrator.
- In the side menu select “Administration” -> “IdP Configuration”.
- On the IdP configuration tab select the Add IdP Configuration blue plus sign.
- In the IdP Information tab provide following Information.
- Name: Beyond Identity User SSO
- Single Sign-on: Select “User”.
- Pick the correct certificate for the User SP Certificate Rotation
- Domains: Select the appropriate domain from the pull-down menu.
- Click Next.
- On the SP Metadata Tab download Service Provider Metadata to be used in the following steps and Click on Next.
- Once logged into Beyond Identity Admin Console UI, click on “Integrations” tab and then click on SAML tab and then click on “SAML Connections”. Click on “Add SAML Connection” and update the fields as following:
- Upload “SP Metadata” xml file downloaded in the previous step.
- Name: “Zscaler Private Access User SSO”
- Click on “Save Changes”.
- Note down the following fields from the recently created SAML Connection. This will be required in the next step.
- IdP Id (Beyond Identity Connection ID)
- IdP Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso
- IdP Issuer: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml
- Download IdP Signature Certificate
- Switching back to Zscaler Private Access Admin Console, on the IdP Configuration tab configure following fields.
- IdP Certificate (Downloaded in previous step)
- Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso (Recorded in the previous step)
- IdP Entity ID: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml (Recorded in the previous step)
- Status: Enabled
- HTTP-Redirect: Enabled
- ZPA (SAML) Request: Signed
- SCIM Sync: Disabled
- SCIM Attributes for Policy: Disabled
- Click on Save.
ZIA USER Authentication Configuration
To configure Beyond Identity as the IdP for ZIA User Login, follow the steps below. Once these steps are taken, you will be ready to enable Beyond Identity for User Login to ZIA Client Connector.
- Sign into the ZIA Admin Console as Administrator.
- In the side menu select “Administration” -> “Authentication Settings”.
- Select the Identity Providers tab.
- Select the “Add IdP” button.
- Download SP Metadata file and save it to use in the next step.
- Logon to Beyond Identity Admin Console UI, and click on “Integrations” tab and then click on SAML tab and then click on “SAML Connections”. Click on “Add SAML Connection” and update the fields as following:
- Upload “SP Metadata” xml file downloaded in the previous step.
- Name: “Zscaler Internet Access User SSO”
- Click on “Save Changes”.
- Note down the following fields from the recently created SAML Connection. This will be required in the next step.
- IdP Id (Beyond Identity Connection ID)
- IdP Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso
- IdP Issuer: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml
- Download IdP Signature Certificate
- Switching back to Zscaler Internet Access Admin Console, on the IdP Configuration tab configure following fields.
- IdP SAML Certificate: Upload (Downloaded in previous step)
- SAML Portal URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso (Recorded in the previous step)
- Status: Enabled
- Login Name Attribute: NameID
- Vendor: Others
- Sign SAML Request: Disable
- HTTP-Redirect: Enabled
- Enable SAML Auto Provisioning: Disable
- Enable SCIM Provisioning: Disable
- Click on Save.
- To Enable the SAML configuration on Authentication Settings page:
- Select the Authentication Profile tab.
- Select SAML as the Authentication type.
- Save and Active the configuration.
Mobile Portal Configuration To Enable API Access
This section describes changes required on Zscaler Mobile Portal to enable API access.
- Sign into the Zscaler Client Connector (Mobile) portal from ZIA (Policy -> ZCC Portal) or ZPA Admin Console (Client Connector from Left Menu bar).
- On ZCC portal click on Administration and look for Public API in the left menu bar.
- Click on Public API and add new API key by clicking on “Add API Key” with following parameters.
- Name: Beyond Identity.
- Status: Enabled
- Role: Write
- Session Validity Interval in seconds: 31540000 (Approx. 1 year)
- Click on Save.
- Note down following fields to be used in the next section.
- Client Secret
- Client ID
BEYOND IDENTITY CONSOLE CONFIGURATION FOR ZSCALER API ACCESS
Beyond Identity supports continuous authentication and monitors device security posture even when the user is not actively trying to authenticate. Beyond Identity uses Zscaler Mobile APIs to force re-authentication of the Zscaler Client Connector in case the device security posture does not meet enterprise policies.
In this section, you’ll create a test group with a single user to test the Deny rule before configuring the policy to target all users.
Note: Before you start, you'll need the Client ID, Client Secret, and Zscaler Mobile Portal URL, which you should have copied from the previous section.
- You will need Client ID, Client Secret and Zscaler Mobile Portal URL before proceeding with the next steps of configuring Beyond Identity Integration with Zscaler Cloud.
- Sign in to the Login to Beyond Identity Admin Console and select navigate to Integrations > Endpoint Management > Zscaler > Edit Configuration.
- Enter the Zscaler Mobile Portal URL (Host Url), Client ID, and Client Secret from the previous step. Then click Save Changes.
- In the Admin Console, go to Groups > Add Group to create a test group with a single user added. You’ll use this group to test the new rule you’ll create in the next step.
- Go to Policy > Edit Policy > Add Rule.
- Create a Deny rule to deny authentication and invoke Zscaler Force Remove Device API.
- Add a custom notification saying Zscaler Client Connector will be logged out soon!!!
- Click Add.and create Add a new rule in the policy to force remove an authenticated device.
During the test phase:
Create a test group.
Add a single user to the test group.
Create a Deny Rule to deny authentication and invoke Zscaler Force Remove Device API.
Add a custom notification “Zscaler Client Connector will be logged out soon!!!”.
Add the Rule.
Change the rule order as needed.
Login to Zscaler Client Connector using the test user.
Publish the Policy.
Authenticate to any application using Beyond Identity – make sure the authentication meets the criteria to trigger the Deny rule.
This should display the custom notification and the Zscaler Client Connector should be logged out in about 3 minutes.
- Change the rule order as needed and click Publish changes.
- Log into Zscaler Client Connector using the test user.
- Authenticate to any application using Beyond Identity ensuring the authentication meets the criteria to trigger the Deny rule.
The custom notification should appear and the Zscaler Client Connector should log out within a 3-minute timeframe.
- If the test was successful, Now configure the policy to target all the users.
Comments
0 comments
Please sign in to leave a comment.