icon-zia.svg
Secure Internet and SaaS Access (ZIA)

Adding Tenant Profiles

Zscaler's tenancy restriction feature allows you to restrict access either to personal accounts, business accounts, or both for certain cloud applications. The feature consists of two parts, creating tenant profiles and associating the profiles with the Cloud App Control policy rules.

To add a tenant profile:

  1. Go to Administration > Tenant Profiles.
  2. Click Add Tenant Profile.

    The Add Tenant Profile page appears.

  3. In the Applications field, select one of the following applications and configure it accordingly:

    • To configure the tenant profile for YouTube, in the YouTube Configuration field, select one of the following configuration types:

      • In the YouTube Category ID field, select the required categories from the following list of categories:

        • Action/Adventure
        • Anime/Animation
        • Autos & Vehicles
        • Classics
        • Comedy
        • Documentary
        • Drama
        • Education
        • Entertainment
        • Family
        • Film & Animation
        • Foreign
        • Gaming
        • Horror
        • Howto & Style
        • Movies
        • Music
        • News & Politics
        • Nonprofits & Activism
        • People & blogs
        • Pets & Animals
        • Science & Technology
        • Sci-fi/Fantasy
        • Shorts
        • Short Movies
        • Shows
        • Sports
        • Thriller
        • Trailers
        • Travel & Events
        • Videoblogging

        You can select any number of YouTube category IDs and also search for YouTube category ID.

        Close
      • In the YouTube Channel ID field, enter the YouTube channel IDs (e.g., UCSylwuqCXM_W13ARfzASm3Q) you want to add to this tenant profile, and click Add Items.

        You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 200 YouTube channel IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

        Close
      • In the YouTube School ID field, enter the IDs YouTube assigned to your school network (e.g., UC1xagwHTcYzlpIriGARvPig), which you want to add to this tenant profile, and click Add Items.

        You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 YouTube school IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

        Close

      To learn more about associating tenant profiles of YouTube with the Cloud App Control policy rule, see Adding a Streaming Media Rule for Cloud App Control.

      Close
    • To configure the tenant profile for Google apps:

      1. In the Domains field, enter the domains (e.g., www.zscaler.com) you want to add to this tenant profile and click Add Items.

        You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 domains. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      2. For the Allow Consumer Access field, select Yes to allow consumer access to the domains in the tenant profile. This field is set to No by default.
      3. For the Allow Visitor Access field, select Yes to allow visitors access to the domains in the tenant profile. This field is set to No by default.

      The service intercepts any google.com (or associated Google app) request and adds the HTTP header X-GoogApps-Allowed-Domains (values of the Domains field), which identifies the domains from which users can access Google services. This prevents users from accessing Gmail and other Google apps from other domains.

      This feature does not affect Google apps that do not require users to sign in, such as Google search. But a user who signs in from Google search with an account that is not placed on the allowlist is blocked.

      For additional information from Google, see here and here.

      To learn more about associating tenant profiles of Google apps with the Cloud App Control policy rule, see Adding Rules to the Cloud App Control Policy.

      Close
    • You can configure the following tenant profile types for Microsoft Login Services:

      • To configure Version 1 tenant profile for Microsoft Login Services:

        1. In the Tenant Directory ID field, enter the tenant directory ID (e.g., f4c77d8d-6bb8-41a2-a3c9-69dd3edaa158).
        2. In the Office 365 Tenants or Tenant IDs field, enter the tenant names or tenant IDs (e.g., corp1.safemarch.com or 784b1673-628c-56e3-c3b2-5d2f0d59524m) that you want to add to this tenant profile, and click Add Items.

          Do not exempt these domains from authentication.

          You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add one tenant directory per tenant profile and up to 500 Office 365 tenant names. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

        3. For the Allow Personal Office 365 Domains field, select No to block the personal Office 365 domains in the tenant profile. This field is set to Yes by default. To learn more about allowing personal accounts for Microsoft applications, see the Microsoft documentation.
        Close
      • In the Tenant Directory ID:Policy ID field, enter the tenant directory ID of your organization followed by the policy ID with a colon in between (e.g., f4c77d8d-6bb8-41a2-a3c9-69dd3edaa158:quadsj) to configure Version 2 tenant profile for Microsoft Login Services. To learn more, refer to the Microsoft documentation.

        The Tenant Directory ID and Policy ID are GUIDs from your tenant on the Azure Active Directory portal. You can find these GUIDs as follows:

        • Tenant Directory ID: Log in as an administrator to the Azure Active Directory portal, select Azure Active Directory, and then select Properties.
        • Policy ID: Call the following API endpoint: /crosstenantaccesspolicy/default. Use the id field value in the Response preview.

        Close

      The version of the tenant profiles can be changed only when the profiles are not associated with any policy.

      The following headers are inserted only for each incoming request to login.microsoftonline.com, login.microsoft.com, login.windows.net, and login.live.com:

      • Restrict-Access-Context (Value of the Tenant Directory ID field)
      • Restrict-Access-To-Tenants (Values of the Office 365 Tenants or Tenant IDs field)
      • sec-Restrict-Tenant-Access-Policy (Value of the Tenant Directory ID:Policy ID field)

      To learn more about Microsoft Tenant Restrictions, see the Microsoft Tenant Restriction documentation and Microsoft documentation.

      To learn more about associating tenant profiles of Microsoft Login Services with the Cloud App Control policy rule, see Adding an IT Services Rule for Cloud App Control.

      Close
    • To configure the tenant profile for Slack:

      1. In the Your Workspace ID field, enter your workspace ID (e.g., T2DQ3J9AA).

        If an incorrect value is entered in this field, Slack might allow traffic to any Slack workspace, resulting in a security gap. To approve Slack workspaces for your network, see the Slack help page.

      2. In the Allowed Workspace ID field, enter the allowed workspace IDs you want to add to this tenant profile, and click Add Items.

        You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 allowed workspace IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      The service intercepts requests related to Slack and adds the following headers:

      • X-Slack-Allowed-Workspaces-Requester (Value of the Your Workspace ID field)
      • X-Slack-Allowed-Workspaces (Values of the Allowed Workspace ID field)

      To learn more about associating tenant profiles of Slack with the Cloud App Control policy rule, see Adding a Collaboration & Online Meetings Rule for Cloud App Control.

      Close
    • To configure the tenant profile for Amazon Web Services, in the Account IDs field, enter the account IDs (e.g., 123456789012) you want to add to the tenant profile and click Add Items.

      You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 256 account IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      To learn more about associating tenant profiles of Amazon Web Services with the Cloud App Control policy rule, see Adding a Hosting Providers Rule for Cloud App Control.

      ZIA supports the following AWS login methods:

      • Sign in to the AWS Management Console as a root user or IAM user.
      • Sign in as a federated identity.
      • Sign in through the AWS Command Line Interface and other programmatic methods like API and SDK (Software Development Kit).
      Close
    • To configure the tenant profile for Dropbox, in the Dropbox Team ID field, enter the team IDs (e.g., 4875936) you want to add to this tenant profile, and click Add Items.

      You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 team IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      The service intercepts requests related to Dropbox and adds the HTTP header X-Dropbox-allowed-Team-Ids (Values of the Dropbox Team ID field). This header's value is the business account's team ID, which can be obtained from the network control section of the Dropbox Business admin console. You must enable network control for tenancy restriction. To learn more about network control, see the Dropbox help page.

      To learn more about associating tenant profiles of Dropbox with the Cloud App Control policy rule, see Adding a File Sharing Rule for Cloud App Control.

      Close
    • To configure the tenant profile for Webex Teams and Webex Meetings, in the Webex Tenants(Webex Teams and Meetings) field, enter the tenants (e.g., zscaler.com) you want to add to this tenant profile and click Add Items.

      You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 tenants. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      The service intercepts incoming requests to the following domains and adds the HTTP header CiscoSpark-Allowed-Domains (Values of the Webex Tenants(Webex Teams and Meetings) field).

      • identity.webex.com
      • identity-eu.webex.com
      • idbroker.webex.com
      • idbroker-secondary.webex.com
      • idbroker-b-us.webex.com
      • idbroker-eu.webex.com
      • atlas-a.wbx2.com

      To learn more about Webex Tenant Restrictions, see the Webex documentation.

      To learn more about associating tenant profiles of Webex Login Services with the Cloud App Control policy rule, see Adding an IT Services Rule for Cloud App Control.

      Close
    • To configure the tenant profile for Zoho Login Services, in the Zoho ID field, enter your Zoho ID (e.g., 100001) you want to add to this tenant profile and click Add Items.

      You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 128 IDs. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      Contact Zoho support to get Zoho ID.

      To learn more about associating tenant profiles of Zoho Login Services with the Cloud App Control policy rule, see Adding an IT Services Rule for Cloud App Control.

      Close
    • To configure the tenant profile for the Google Cloud Platform:

      1. In the Allowed Organization IDs field, enter the allowed organization IDs (e.g., 123456789012) you want to add to this tenant profile and click Add Items. To learn more, refer to the Google Cloud documentation.

        You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 tenants. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      2. For the Allow Cloud Storage Resources field, select Yes to allow the users to access the public cloud storage resources. This field is set to No by default.

      To learn more about associating Google Cloud Platform tenant profiles with the Cloud App Control policy rule, see Adding a Hosting Providers Rule for Cloud App Control.

      Close
    • To configure a tenant profile for Zoom, in the Policy Label field, enter the policy label associated with the X-ZoomApps-Policy header for Zoom.

      Contact Zoom Support for the policy label.

      To learn more about associating Zoom tenant profiles with the Cloud App Control policy rule, see Adding a Collaboration & Online Meetings Rule for Cloud App Control.

      You can associate only one Zoom tenant profile with the Cloud App Control policy rule.

      Close
    • To configure a tenant profile for IBM SmartCloud, in the IBM Account IDs field, enter the account IDs (e.g., 1234567890123456) associated with the IBM-Cloud-Tenant header for IBM SmartCloud and click Add Items. To learn more, refer to the IBM Cloud documentation.

      You can enter multiple entries. Press Enter after each entry, then click Add Items. You can add up to 100 account IDs per profile. To learn more, see Ranges & Limitations. For item lists, you can filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.

      The service intercepts incoming requests to cloud.ibm.com and its subdomain (*cloud.ibm.com) and adds the HTTP header IBM-Cloud-Tenant (Values of the IBM Account IDs field).

      To learn more about associating IBM SmartCloud tenant profiles with the Cloud App Control policy rule, see Adding a Hosting Providers Rule for Cloud App Control.

      Close
    • To configure a tenant profile for GitHub, in the Enterprise Slug for GitHub field, enter the enterprise slug (e.g., avocado-corp) associated with the sec-GitHub-allowed-enterprise header for GitHub. To learn more, refer to the GitHub documentation.

      You can add only one enterprise slug per profile. To learn more, see Ranges & Limitations.

      To learn more about associating GitHub tenant profiles with the Cloud App Control policy rule, see Adding a System & Development Rule for Cloud App Control.

      Close

    Ensure to select these cloud applications as a criterion in an SSL Inspection rule if their tenant profiles are associated with a cloud application rule.

    In the SSL Inspection rule, for the following cloud applications, do as follows:

    • Office 365: Select Microsoft Login Services as the cloud application with a rule order higher than Office 365 One Click Rule.
    • Google Apps: Select Google Login Services as the cloud application.
    • Webex Teams/Webex Meetings: Select Webex Login Services as the cloud application.

  4. In the Tenant Profile Name field, enter a unique name for the tenant profile.

    This name is displayed while configuring the respective Cloud App Control policy rules.

  5. Description: (Optional) Enter any additional comments or information. The description cannot exceed 10,240 characters.
  6. Click Save and activate the change.
Related Articles
About Tenant ProfilesAdding Tenant Profiles