icon-unified.svg
Experience Center

Understanding Admin Scope

With role-based administration, an admin's scope specifies which areas of the organization an admin can manage in the Admin Portal. The default admin has scope over the entire organization. For each additional admin you create, you must select one of the following scopes:

  • Organization
  • Department
  • Location
  • Location Group

You can assign scope over the entire organization or either location, location group, or department (you can't combine location, location group, and department).

The Effect of a Scope on an Admin

An admin’s scope affects the following areas:

  • Admins can only define rules and settings for their assigned locations, location groups, or departments.

    • Graphic depicting admin with scope over Germany and France and choosing only to apply rules to Germany

      For example, consider Admin A, assigned scope over two locations, Germany and France. When Admin A creates a policy rule:

      • Admin A is required to make a selection for the Locations criteria. Because of her scope, only Germany and France are available for selection.
      • Admin A can choose any or all users, departments, and groups. The rule applies, however, only to users, department, or group members who are in Germany or France.

      In the scenario depicted below, Admin A creates a rule and specifies Germany as a location. Admin A then chooses any user, group, or department. The rule applies only to users inside the orange box.

      Close
    • Graphic illustrating admin with Scope over Department

      As another example, consider Admin B, assigned scope over two departments, HR and IT. When Admin B creates a policy rule:

      • Admin B is required to make a selection for the Departments criteria. Only the HR and IT departments are available for selection.
      • Admin B is required to make a selection for the Users criteria. Only users from the HR and IT departments are available for selection.

      If Admin B selects a department in the Departments criteria, the rule applies to all users in that department, no matter which users Admin B selects in the Users criteria. Thus, specifying users in the Users criteria is useful only if Admin B is selecting users from a department different than the one Admin B selects in the Departments criteria (for example, if Admin B selects the IT department in the Departments criteria and then selects users from HR in the Users criteria).

      • Admin B is required to select a group. The rule applies to all members of the specified group, regardless of their department. To limit the rule to just members of the department specified in the Departments criteria, Zscaler recommends that admins choose a group that contains just those department members. For example, if an admin wants to make sure a rule applies just to members of Finance, the admin must create a group with just the Finance department members and then select that group. Zscaler recommends that you avoid selecting “Any” for group.
      • Admin B can select any (or all) locations. The rule applies only to specified users and department or group members in the selected locations.

      In the scenario depicted below, Admin B creates a rule and specifies the following for each criteria:

      • Users: John Doe from IT
      • Departments: HR
      • Groups: HR-Group
      • Location: Germany, France, and Belgium

      This rule applies only to users inside the orange box.

      Close
    Close
  • Admins can edit a rule or setting only if their scope is equal to or greater than the scope assigned the rule or setting. Along with scope, admin rank also impacts which rule or setting an admin can edit. For example, consider a URL filtering rule that has a location criterion of Germany and France. Only an admin with scope over both Germany and France can edit this rule. Admin A, who has scope only over Germany, would not be able to edit this rule.

    Close
  • If admins have permission to manage admins, their scope limits the scope that they can assign other admins. For example, if Admin A, who has scope over Germany, creates an admin, and she wants to assign a scope by location, only Germany is available as an option. However, if she wants to assign the admin a scope in the department category, she can choose any (or all) departments.

    Close
  • Only admins who have scope over the entire organization can create or edit organization-wide policies, settings, and resources. For example, only admins with organizational scope can edit security policies or create custom URL categories.

    Close
  • The following table outlines how admin scope impacts the ability to access the Admin Portal features.

    Analytics
    FeaturesAdmin Scope Impact

    Dashboard

    • Web Overview
    • Security
    • Web Browsing
    • Cloud Applications
    • Mobile Applications
    • DNS Overview
    • Firewall Overview
    Admins can only view traffic information for areas over which they have scope.

    Analytics

    • Interactive Reports
    • Scheduled Reports
    Admins can only access reports for areas over which they have scope.
    Administration
    FeaturesAdmin Scope Impact

    Account Management

    Company Profile

    For Company Profile, admins require organizational scope to make changes.

    Admin Management

    • Administrator Management
    • Role Management
    • Audit Logs
    • For Administrator Management, the admins’ scope limits the scope that they can assign other admins. To make changes to Auditors in Administrator Management, admins must have organizational scope.
    • For Role Management, admin requires organizational scope to make changes.
    • For Audit Logs, admins require organizational scope to make changes.

    Identity

    • Authentication Settings
    • User Management
    • Identity Proxy Settings
    • For Authentication Settings, admins require organizational scope to make changes.
    • For User Management, if admins are assigned scope over specific departments, they can only manage users from that department. If admins are assigned organizational scope or scope over locations, admins can manage all users.
    AlertsFor Alerts, if specifying users, departments, or locations, admins can only set alerts for users in their assigned departments or for their assigned locations. For example, if Admin A, who has scope over Germany, creates an alert, and she wants to have the alert apply by location, only Germany is available as an option. For Admin B who has scope over the HR and IT departments, only HR and IT are available as options for department, and if specifying users, only users from those departments are available as options.
    Backup & RestoreFor Backup & Restore, admins with limited scope may back up policies, but only admins with organizational scope can restore policies.
    Policies
    FeaturesAdmin Scope Impact

    Access Control

    • URL & Cloud App Control
    • URL Categories
    • File Type Control
    • Mobile App Store Control
    • Firewall Control
    • DNS Control
    • FTP Control
    • Network Services
    • Network Applications
    • IP Groups
    • For URL categories whose super category is User-Defined, admins require that their operational scope matches at least one of the scopes defined in the category to make changes.
    • For Network Services, admins with organizational scope can add and edit Services and Services Groups, while admins with limited scope can add Services and Service Groups, but not edit them.
    • For Network Applications, admins with organizational scope can add and edit Applications Groups, while admins with limited scope can add Application Groups, but not edit them.
    • For IP Groups, admins with organizational scope can add and edit Source and Destination IP groups, while admins with limited scope can add Source and Destinations IP Groups, but not edit them.
    • For all other features, admins can only define rules for their assigned locations or departments.

    Cybersecurity

    • Advanced Threat Protection
    • Malware Protection
    • Mobile Malware Protection
    • Sandbox
    • Browser Control
    Admins require organizational scope to edit policies.

    Data Protection

    • Data Loss Prevention
    • DLP Dictionaries & Engines
    • DLP Notification Templates
    • Index Templates
    • Index Tool
    • For Data Loss Prevention, admins can only define rules for their assigned locations or departments.
    • For all other features, admins require organizational scope to make changes.

    Common Configuration

    • SSL Inspection
    • End User Notifications
    • Time Intervals
    • For SSL Inspection, admins can only define rules for their assigned locations or departments.
    • For all other features, admins require organizational scope to make changes.
    Infrastructure
    FeaturesAdmin Scope Impact

    Traffic Forwarding

    • Locations
    • VPN Credentials
    • Hosted PAC Files
    • Virtual Service Edges
    • For Locations:
      • Admins require organizational scope to add locations.
      • If the admin’s scope is limited by location, the admin can make changes only for that location.
      • If the admin has scope over organizations or departments, the admin can make changes to all locations.
    • For all other features, admins require organizational scope to make changes.

    Network Policies

    • Bandwidth Control
    • Bandwidth Classes
    • For Bandwidth Control, admins can only define rules for their assigned locations or departments.
    • For Bandwidth Classes, admins require organizational scope to make changes.
    Logs
    FeaturesAdmin Scope Impact

    Insights

    • Web Insights
    • Mobile Insights
    • Firewall Insights
    • DNS Insights
    Admins can only access insights for areas over which they have scope.

    Log Streaming

    Nanolog Streaming Service

    Admins require organizational scope to make changes.
    Close

The Benefits of Admin Scope and Role

The process of creating an admin by assigning a role ensures that rules and settings configured by that admin aren't impacted even if the admin account is modified or deleted at some point in the future. This is because a rule or setting is associated with an admin’s role (the role’s admin rank, to be specific) and admin scope rather than a particular admin. Furthermore, if an admin account is deleted, you don't lose all the distinct permissions and functional scopes associated with that admin. You can simply reassign the admin scope and role, which includes configured permissions and functional scopes, to another admin.

For example, your organization’s CISO may have an admin account with access to all security-related policies and scope over the organization. If a CISO leaves the organization and their account is deleted, the policy rules they created would not be affected and would remain in place. Furthermore, you can easily assign the next CISO the same role and admin scope as the previous CISO, without redefining permissions and functional scopes from scratch.

Related Articles
About AdministratorsUnderstanding Admin ScopeEditing Internet & SaaS Super AdminsEditing Internet & SaaS AdminsAdding SD-WAN Partner API Clients