Reader small image

You're reading from  Zscaler Cloud Security Essentials

Product typeBook
Published inJun 2021
PublisherPackt
ISBN-139781800567986
Edition1st Edition
Right arrow
Author (1)
Ravi Devarasetty
Ravi Devarasetty
author image
Ravi Devarasetty

Ravi Devarasetty is originally from India and came to the United States for his higher education. He started his IT career in embedded software development, moved into 24x7 network operations, later transitioned into secure web gateways, and now works in public cloud security. He likes constant learning, both through self-study and via mentoring relationships. He likes to tinker with technology and loves it when he is able to put the things he has learned toward creating a unique solution. He has experience working as a Zscaler solution deployment engineer as part of a Managed Security Service Provider (MSSP) and as a Zscaler consultant. He holds multiple Zscaler certifications, and is also certified in CISSP, CCSK, AlienVault, AWS, and Microsoft Azure.
Read more about Ravi Devarasetty

Right arrow

Chapter 8: Exploring the ZPA Admin Portal and Basic Configuration

In this chapter, we will navigate through the Zscaler Private Access (ZPA) Admin Portal and configure the ZPA log servers. We will also discuss the steps involved in configuring authentication and the Zscaler Client Connector (ZCC) app for ZPA.

These topics lay the foundation needed for an administrator to deploy a ZPA solution within an enterprise. In this chapter, we are going to cover the following topics:

  • Navigating around the ZPA Admin Portal
  • Configuring the ZPA log servers for activity insights
  • Integrating with Azure Active Directory (Azure AD) and Okta for single sign-on (SSO)
  • Configuring the ZCC app for ZPA

Configuring the ZPA log servers for activity insights

Recall that the log servers for ZPA are very similar to the Nanolog servers we saw for ZIA. However, there is no need for a Log Streaming Service (LSS) virtual machine (VM) such as a Nanolog Streaming Service (NSS) VM. After logging in to the ZPA Admin Portal, enterprise administrators need to navigate to Administration -> Log Streaming Service -> Log Receivers.

Under the Log Receivers tab, click on the blue + icon to add a new log receiver, and then fill in the following fields:

  • Name—Provide a suitable name that can be used to quickly identify the purpose of this log receiver from the main Log Receivers page.
  • Description—A free-flowing text field that can elaborate on what this log receiver does.
  • Domain or IP Address—Enter a fully qualified domain name (FQDN) or an IP address of the receiver.
  • TCP Port—The port number for the receiver.
  • Connector Groups—Select one...

Integrating with Azure AD and Okta for SSO

We already discussed the benefits of user authentication in Chapter 4, Understanding Traffic Forwarding and User Authentication Options. Here, we will look at how to configure ZPA end-user authentication using an IdP such as Azure AD and Okta. The first step in this process is to add an IdP in the ZPA Admin Portal. Enterprise users have an option to authenticate against multiple IdPs.

Adding an IdP

A ZPA administrator needs to first log in to the ZPA Admin Portal and then navigate to Administration -> Authentication -> Settings. In the Primary Authentication Domain section, the administrator should verify the domains defined for their enterprise. If any domains are incorrect or missing, Zscaler support should be engaged immediately to rectify this situation. Please note that at least one authentication domain per IdP is needed if the administrator plans to add multiple IdPs.

Once this verification is completed, click on the...

Configuring the ZCC app for ZPA

Let's now learn how to prepare the ZCC app for a ZPA deployment within an enterprise. We already discussed the options supported by the ZCC app in detail in the context of ZIA, in Chapter 4, Understanding Traffic Forwarding and User Authentication Options, so we will not duplicate them here and only mention ZPA-specific options.

ZCC app installation

The first step is the installation of the app by the appropriate IT department within an enterprise. A few settings can be set beforehand for groups of enterprise users that will be using the app. Those settings include App Profile, Forwarding Profile, Notification, Support, Trusted Network, Zscaler Service Entitlement, User Agent, and Device Posture configurations.

On mobile devices, the ZCC app can be installed using the applicable app stores by the end users themselves. In a large enterprise, the ZCC app can be deployed using a mobile device management (MDM) platform. A MDM platform allows...

Summary

In this chapter, we started our journey toward configuring the various components of a ZPA solution for an enterprise. We started with an overview of the ZPA Admin Portal, configured ZPA log servers and user authentication, and ended with in-depth configuration settings for the ZCC app.

In the next chapter, we will continue our journey and complete the remaining configuration of the ZPA admin portal. We will also learn how to integrate ZPA with the IdP for SSO, look at best practices for enterprise deployments, and deploy connectors in on-premises data centers and the public cloud.

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. ZPA applications should be ideally configured with the Dynamic Server Discovery option.

    a. True

    b. False

  2. Every new ZPA account comes with the following default certificates:

    a. Root

    b. Connector

    c. Client

    d. All the above

  3. Secure Sockets Layer (SSL) interception can be performed on the path between:

    a. The ZCC app and the ZPA cloud

    b. App Connectors and the ZPA cloud

    c. Neither of the above

    d. Both of the above

  4. Applications such as an active File Transfer Protocol (FTP) and Voice over IP (VoIP) work great on ZPA.

    a. True

    b. False

Further reading

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Zscaler Cloud Security Essentials
Published in: Jun 2021Publisher: PacktISBN-13: 9781800567986
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Ravi Devarasetty

Ravi Devarasetty is originally from India and came to the United States for his higher education. He started his IT career in embedded software development, moved into 24x7 network operations, later transitioned into secure web gateways, and now works in public cloud security. He likes constant learning, both through self-study and via mentoring relationships. He likes to tinker with technology and loves it when he is able to put the things he has learned toward creating a unique solution. He has experience working as a Zscaler solution deployment engineer as part of a Managed Security Service Provider (MSSP) and as a Zscaler consultant. He holds multiple Zscaler certifications, and is also certified in CISSP, CCSK, AlienVault, AWS, and Microsoft Azure.
Read more about Ravi Devarasetty