Secure Private Access (ZPA)
About SAML Attributes
You must configure SAML attributes to use them when defining policy rule criteria. For example, if you want to define users for your policies using email addresses, you must configure the users' email address SAML attribute in the ZPA Admin Portal. You can configure SAML attributes using one of the following methods:
- You can import your SAML attributes. This option requires that you generate a complete list of SAML attributes from your IdP, and then import that list into the ZPA Admin Portal. To learn more, see Importing SAML Attributes.
- You can manually add your SAML attributes. To learn more, see Manually Adding SAML Attributes.
In ZPA, various authorization attributes can be provided by the IdP to the Zscaler Client Connector in the SAML assertion, unlike Zscaler Internet Access (ZIA), where SAML assertions are restricted to user identity, group, and department attributes. The SAML assertion is used with every application access attempt to ensure that only authenticated users gain access.
SAML attributes provide the following benefits and enable you to:
- Define policies for least privileged access.
- Define a streaming policy when configuring a log receiver.
ZPA does not use a hosted user database for provisioning, so user attributes within SAML assertions cannot be viewed within the ZPA Admin Portal. SAML assertions which contain these user attributes are encrypted and stored locally by Zscaler Client Connector.
About the SAML Attributes Page
The SAML Attributes page is replaced by the Session Attributes page if you are subscribed to ZIdentity for users. To learn more, see What Is ZIdentity?
On the SAML Attributes page (Authentication > User Authentication > SAML Management > SAML Attributes), you can do the following:
- View a list of applied filters available from the current and previous user sessions. Applied filters must be saved to the user session first before they can be viewed. Use the drop-down menu to select the applied filters to view. To learn more, see Using Tables.
- Hide the filters on the page by clicking Hide Filters. Click Show Filters to show the filters.
- Refresh the SAML Attributes page to reflect the most current information.
Filter the information that appears in the table to show attributes for a specific IdP. You can also save applied filters to your preferences so that they're visible in future user sessions. To learn more, see Using Tables.
The ability to filter the list to show attributes for a specific IdP is hidden if you are subscribed to ZIdentity for users.
Add new SAML attributes by importing the attributes or adding them manually.
The Add button is hidden if you are subscribed to ZIdentity for users. To learn more, see What Is ZIdentity?
- View a list of SAML attributes that were imported or added. For each attribute, you can see:
- Name: The name specified for the attribute within the ZPA Admin Portal when it was imported or added. This name is only for reference and might not be identical to the corresponding entry in the SAML Attribute column.
- SAML Attribute or Session Attribute: The SAML attribute as it is specified in the IdP. If you are subscribed to ZIdentity for users, then the SAML Attribute column is replaced with the Session Attribute column. To learn more, see What Is ZIdentity?
- IdP Name: The name of the IdP configuration in the ZPA Admin Portal. This is the IdP where the attribute was imported or added from.
Edit an existing SAML attribute.
The Edit button is hidden if you are subscribed to ZIdentity for users.
Delete a SAML attribute.
The Delete button is hidden if you are subscribed to ZIdentity for users.
- Modify the columns displayed in the table.
- Display more rows or a different page of the table.
- Open the Zscaler Help Browser and view Help Portal articles without leaving the ZPA Admin Portal.
- Go to the IdP Configuration page to add a new IdP for single sign-on (SSO) or manage existing configurations.
- Go to the Settings page to modify authentication settings (e.g., enabling Remote Assistance).
- Go to the Emergency Access page to configure emergency access for third-party users.
- Go to the Emergency Access Users page to view and manage users designated for emergency access.
