icon-unified.svg
Experience Center

Using Zscaler Client Connector as an Identity Provider

Zscaler Client Connector can function as an identity provider (IdP) for the Zscaler service. With this feature, users do not need to be tied to your organization’s standard IdP in order to authenticate to the Zscaler service. Instead, if your organization uses SAML-based single sign-on (SSO), Zscaler Client Connector can use a device token to auto-provision and silently authenticate users and devices for the Zscaler service.

You can generate the device token in the Admin Portal and pass the token to Zscaler Client Connector in an installer option. In addition, you must select Zscaler Client Connector as your authentication method. The app is then able to gather user ID and other relevant parameters from devices and send the information to the Zscaler cloud in SAML requests. The Admin Portal parses and verifies the SAML requests, enabling the Zscaler cloud to provision and silently authenticate users.

Configuring Zscaler Client Connector to function as an IdP

To configure Zscaler Client Connector to function as an IdP:

  1. Create a Device Token in the Admin Portal
  2. Add Zscaler Client Connector as an IdP in the Admin Portal
  3. To use Zscaler Client Connector as an IdP for your users, you must pass the device token, user domain, and cloud name to users' devices during installation.

    Close
Related Articles
About Platform SettingsEnabling Browser-Based AuthenticationEnabling WebView2 AuthenticationEnabling Resizing of the Zscaler Client Connector Authentication WindowAbout Zscaler Client Connector IdPUsing Zscaler Client Connector as an Identity ProviderCreating a Device TokenConfiguring Passwords for Access in Unattended ModeZscaler Client Connector and Imprivata Integration