icon-unified.svg
Experience Center

Understanding Double Encryption

By default, traffic between Zscaler Client Connector and an App Connector is encrypted using TLS 1.2 tunnels between Zscaler Client Connector and the Private Applications (ZPA) Public Service Edge or Private Applications Private Service Edge, and between the App Connector and the Private Applications Public Service Edge or Private Applications Private Service Edge.

However, standard Private Applications application traffic is not encrypted by Zscaler as it transits the Private Applications Public Service Edge or Private Applications Private Service Edge in memory—never written to disk. Enabling double encryption when defining an application allows an organization to add an additional layer of encryption inside the outer TLS tunnels, so that traffic is encrypted in memory as it transits the Private Applications Public Service Edge or Private Applications Private Service Edge.

Double encryption is recommended only for sensitive data transmitted over unencrypted protocols (e.g., HTTP, FTP, telnet, etc.). You do not need double encryption for applications that leverage end-to-end encrypted protocols (e.g., HTTPS, SSH, RDP, etc.), because the content of that traffic is already protected by the protocol’s encryption. Use of double encryption for end-to-end protocols is strongly discouraged, since you end up with three layers of encryption (outer TLS encryption, inner double encryption, native protocol encryption) which incurs unnecessary performance cost and can cause MTU issues.

Double encryption is associated with the data traffic over an App Connector. Because extranet doesn't use a traditional App Connector, double encryption is not supported for it.

To enable double encryption on relevant applications, the certificates used to sign the connector and client certificates must share a certificate authority (CA). The CA can be either the default CA that was created within Private Applications at the provisioning time, or it can be a custom public key infrastructure (PKI) CA from the customer (i.e., the default-provisioned tenants can use double encryption simply by enabling it, as the certificates adhere to the requirements stated above). Double encryption fails if the certificate of a client and a certificate of an App Connector do not share a common root CA. To learn more, see About Enrollment (CA) Certificates.

Double encryption occurs at the domain level. If double encryption is enabled for an application segment containing a domain, then all application segments sharing that domain will have double encryption enabled (i.e., if there is an application segment labeled app1.company.com TCP port 80 with double encryption turned on, then a different segment with the same domain—say, app1.company.com TCP port 22—will also have double encryption turned on).

When double encryption is enabled on a specific application segment, traffic for the application matching that application segment is encrypted using Zscaler Client Connector and App Connector certificates signed by the intermediate signing certificates. This encrypted traffic is sent to the ZPA Public Service Edges or Private Applications Private Service Edges through TLS sessions that are initially set up between the Zscaler Client Connector and the App Connector. To learn more about enabling double encryption for an application segment, see Configuring Defined Application Segments.

If you enable double encryption, additional processing by the App Connector is required. Typically, this means the traffic counts double against the App Connector's capacity, versus standard Private Applications traffic. For example, 100 Mbps of double encryption traffic has the same performance cost on the App Connector as 200 Mbps of standard application traffic. To learn more about App Connector sizing requirements and throughput, see App Connector Deployment Prerequisites.

Related Articles
About ApplicationsConfiguring Defined Application SegmentsEditing Defined Application SegmentsAbout AI-Powered Recommendations for Application SegmentsConfiguring AI-Powered RecommendationsMerging AI-Powered RecommendationsSharing Defined Application SegmentsConfiguring AI-Powered Recommendations SettingsValidating a Client HostnameAdding DNS Search DomainsSetting Application Segment Configuration WarningsAbout AppProtection ApplicationsAbout Privileged Remote Access ApplicationsAbout Application DiscoveryAbout Application AccessUnderstanding Double EncryptionUnderstanding Health ReportingDefining a Dynamically Discovered ApplicationConfiguring Bypass SettingsDisabling Access to ApplicationsUnderstanding Source IP Anchoring DirectUsing Application Segment MultimatchAbout Application Segment ImportUsing Application Segment ImportMerging Imported Application Segments