Okta

How to Configure SAML 2.0 for Zscaler 2.0

Contents


Supported Features

The Okta/Zscaler 2.0 SAML integration currently supports the following features:


Configuration Steps

  1. Log into the Zscaler application.

  2. Select the Administration tab, then go to Authentication Settings. For Authentication Type, click SAML, then click Configure SAML.

    “zscaler1.jpg"

  3. In the Identity Provider (IDP) Options section of the SAML Configuration screen, enter the following:

    • SAML Portal URL: Copy and paste the following:

      Sign in to the Okta Admin app to have this variable generated for you.

    • Login Name Attribute: Enter NameID.

    • Public SSL Certificate: First click here to download the certificate for upload:

      Sign in to the Okta Admin app to have this variable generated for you.

      Then click Upload to upload it to Zscaler.

    • Click Save.

    • “zscaler2.jpg"

  4. Done!


Setup SAML Auto-Provisioning Options

On the Zscaler Administration page, complete the following steps.

  1. Click Manage Users & Authentication.

  2. Click Edit, then click Configure SAML Single Sign-On parameters.

  3. Click Enable SAML Auto-Provisioning.

  4. For Attribute containing User Display Name enter the following:
     
    DisplayName

  5. For Attribute containing Group Name enter the following:
     
    memberOf

  6. For Attribute containing Department Name enter the following:
    Department

  7. Click Done.

  8. Click Save.

  9. In Okta, select the Sign On tab for the Zscaler Private Access 2.0 SAML app, then click Edit.

  10. “zscaler2_3.png"

  11. In the memberOf field, use the drop-down menu to select the type of condition and then enter the expression that specifies the groups to that you would like to send in your SAML assertion.

    In the example above, the condition is a regular expression (Regex) and the expression specified is .*. This means that all groups that the user belongs to will be sent in the assertion. You can modify the condition as needed.

  12. Click Save.

  13. Open a browser window.
  14. Set your browser proxy to gateway.[ yourZscalerDomain]:80.

    For example if your Zscaler Domain is Zscalerbeta.net; use gateway.Zscalerbeta.net:80 proxy.

  15. Add your Okta URL host ([yourSubdomain].okta.com) and *.oktacdn.com to the proxy bypass list.

    For example if you log into https://acme.okta.com/; enter acme.okta.com.

    Here is an example, shown in a Firefox browser:

    “zscaler_nez1.jpg"

Your users are ready to single sign-on to Zscaler.


Notes


SP-initiated SSO

  1. Open your site.
  2. You will be redirected to https://gateway.[yourZscalerDomain] and prompted for a User Name.
  3. Enter your User Name, then click Sign In.