Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Zscaler Cloud Security Essentials

You're reading from  Zscaler Cloud Security Essentials

Product type Book
Published in Jun 2021
Publisher Packt
ISBN-13 9781800567986
Pages 236 pages
Edition 1st Edition
Languages
Author (1):
Ravi Devarasetty Ravi Devarasetty
Profile icon Ravi Devarasetty

Table of Contents (15) Chapters

Preface 1. Section 1: Zscaler for Modern Enterprise Internet Security
2. Chapter 1: Security for the Modern Enterprise with Zscaler 3. Chapter 2: Understanding the Modular Zscaler Architecture 4. Chapter 3: Delving into ZIA Policy Features 5. Chapter 4: Understanding Traffic Forwarding and User Authentication Options 6. Chapter 5: Architecting and Implementing Your ZIA Solution 7. Chapter 6: Troubleshooting and Optimizing Your ZIA Solution 8. Section 2: Zero-Trust Network Access (ZTNA) for the Modern Enterprise
9. Chapter 7: Introducing ZTNA with Zscaler Private Access (ZPA) 10. Chapter 8: Exploring the ZPA Admin Portal and Basic Configuration 11. Chapter 9: Using ZPA to Provide Secure Application Access 12. Chapter 10: Architecting and Troubleshooting Your ZPA Solution 13. Assessments 14. Other Books You May Enjoy

Evaluating user authentication options

We saw how end user internet traffic is forwarded to Zscaler in the previous sections. When creating a new location, we saw an option called Enforce Authentication, which can force the end user to authenticate. If an end user is not authenticated, the administrator has no option but to apply all the policies on a per-location basis. If the policies are applied on a per location basis, there is no visibility into user-level web activities. This choice does not fully leverage the granular policy application feature of ZIA.

Before we evaluate the available user authentication options, let's examine why enterprises usually require user authentication.

Benefits of user authentication

It is very common for end users to authenticate into any application to gain access. Consequently, their permissions are granted accordingly. Similarly, when users authenticate into ZIA, policies can be set on a granular level based on the user, user&apos...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}