Tutorial: Configure Zscaler One for automatic user provisioning
This tutorial demonstrates the steps to perform in Zscaler One and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and deprovision users and groups to Zscaler One.
Note
This tutorial describes a connector that's built on top of the Azure AD user provisioning service. For information on what this service does, how it works, and frequently asked questions, see Automate user provisioning and deprovisioning to software-as-a-service (SaaS) applications with Azure Active Directory.
Prerequisites
The scenario outlined in this tutorial assumes that you have:
- An Azure AD tenant.
- A Zscaler One tenant.
- A user account in Zscaler One with admin permissions.
Note
The Azure AD provisioning integration relies on the Zscaler One SCIM API. This API is available to Zscaler One developers for accounts with the Enterprise package.
Add Zscaler One from the Azure Marketplace
Before you configure Zscaler One for automatic user provisioning with Azure AD, add Zscaler One from the Azure Marketplace to your list of managed SaaS applications.
To add Zscaler One from the Marketplace, follow these steps.
In the Azure portal, in the navigation pane on the left, select Azure Active Directory.

Go to Enterprise applications, and then select All applications.

To add a new application, select New application at the top of the dialog box.

In the search box, enter Zscaler One and select Zscaler One from the result panel. To add the application, select Add.

Assign users to Zscaler One
Azure Active Directory uses a concept called assignments to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users or groups that were assigned to an application in Azure AD are synchronized.
Before you configure and enable automatic user provisioning, decide which users or groups in Azure AD need access to Zscaler One. To assign these users or groups to Zscaler One, follow the instructions in Assign a user or group to an enterprise app.
Important tips for assigning users to Zscaler One
We recommend that you assign a single Azure AD user to Zscaler One to test the automatic user provisioning configuration. You can assign additional users or groups later.
When you assign a user to Zscaler One, select any valid application-specific role, if available, in the assignment dialog box. Users with the Default Access role are excluded from provisioning.
Configure automatic user provisioning to Zscaler One
This section guides you through the steps to configure the Azure AD provisioning service. Use it to create, update, and disable users or groups in Zscaler One based on user or group assignments in Azure AD.
Tip
You also can enable SAML-based single sign-on for Zscaler One. Follow the instructions in the Zscaler One single sign-on tutorial. Single sign-on can be configured independently of automatic user provisioning, although these two features complement each other.
Note
When users and groups are provisioned or de-provisioned we recommend to periodically restart provisioning to ensure that group memberships are properly updated. Doing a restart will force our service to re-evaluate all the groups and update the memberships.
Configure automatic user provisioning for Zscaler One in Azure AD
Sign in to the Azure portal. Select Enterprise applications > All applications > Zscaler One.

In the applications list, select Zscaler One.

Select the Provisioning tab.

Set the Provisioning Mode to Automatic.

Under the Admin Credentials section, fill in the Tenant URL and Secret Token boxes with the settings for your Zscaler One account as described in Step 6.
To obtain the tenant URL and secret token, go to Administration > Authentication Settings in the Zscaler One portal UI. Under Authentication Type, select SAML.

a. Select Configure SAML to open the Configure SAML options.

b. Select Enable SCIM-Based Provisioning to get the settings in Base URL and Bearer Token. Then save the settings. Copy the Base URL setting to Tenant URL in the Azure portal. Copy the Bearer Token setting to Secret Token in the Azure portal.
After you fill in the boxes shown in Step 5, select Test Connection to make sure that Azure AD can connect to Zscaler One. If the connection fails, make sure your Zscaler One account has admin permissions and try again.

In the Notification Email box, enter the email address of the person or group to receive the provisioning error notifications. Select the Send an email notification when a failure occurs check box.

Select Save.
Under the Mappings section, select Synchronize Azure Active Directory Users to Zscaler One.

Review the user attributes that are synchronized from Azure AD to Zscaler One in the Attribute Mappings section. The attributes selected as Matching properties are used to match the user accounts in Zscaler One for update operations. To save any changes, select Save.

Under the Mappings section, select Synchronize Azure Active Directory Groups to Zscaler One.

Review the group attributes that are synchronized from Azure AD to Zscaler One in the Attribute Mappings section. The attributes selected as Matching properties are used to match the groups in Zscaler One for update operations. To save any changes, select Save.

To configure scoping filters, follow the instructions in the scoping filter tutorial.
To enable the Azure AD provisioning service for Zscaler One, in the Settings section, change Provisioning Status to On.

Define the users or groups that you want to provision to Zscaler One. In the Settings section, select the values you want in Scope.

When you're ready to provision, select Save.

This operation starts the initial synchronization of all users or groups defined in Scope in the Settings section. The initial sync takes longer to perform than later syncs. They occur approximately every 40 minutes as long as the Azure AD provisioning service runs.
You can use the Synchronization Details section to monitor progress and follow links to the provisioning activity report. The report describes all the actions performed by the Azure AD provisioning service on Zscaler One.
For information on how to read the Azure AD provisioning logs, see Reporting on automatic user account provisioning.
Change Logs
- 05/16/2022 - Schema Discovery feature enabled on this app.
Additional resources
- Manage user account provisioning for enterprise apps
- What is application access and single sign-on with Azure Active Directory?
Next steps
Povratne informacije
Pošalјite i prikažite povratne informacije za