icon-zia.svg
Secure Internet and SaaS Access (ZIA)

Deploying SSL Inspection

To deploy SSL inspection:

  • Before deploying SSL inspection for your organization, consider the following best practices:

    • Enable SSL inspection on a small location or test lab before enabling it on all locations in your organization to understand how this feature works.
    • If you are using the Zscaler intermediate certificate, ensure that the Zscaler root certificate is distributed to all users and that it is installed in their browsers before enabling SSL in a location.
    • You might also update your end user notification to inform users of your organization's SSL Inspection policy.
    • When you define SSL Inspection policy, you can create a list of URLs/URL categories and cloud apps/cloud app categories for which SSL transactions are not to be decrypted.
    • Start by enabling SSL inspection for risky URL categories only, such as Privacy Risk and Legal Liability categories such as Adult Themes and Gambling. Include all other categories in the list of URL categories for which SSL transactions are not to be decrypted. Then, when your organization is ready, enable SSL inspection for all URL categories except Finance and Health, to allay privacy concerns within the organization.
    • The list of URL categories and cloud apps for which SSL transactions will not be decrypted does not apply to road warriors who configure their browsers or PAC files to send traffic to port 9443. To use this feature, your organization must subscribe to a dedicated proxy port.
    • Ensure to update the global bypass list to bypass TLS sessions using Client Certificate Authentication. Zscaler does not support the decryption of mutually authenticated TLS sessions.

    Mutual TLS authentication, or two-way TLS, is a digital security protocol where both the client and the server verify each other's identities before initiating communication. This protocol enhances security by ensuring that the data is shared only between authenticated and trusted entities. This reduces the risk of impersonation or man-in-the-middle attacks.

    In this authentication process, the client and server exchange digital certificates, essentially digital IDs issued by trusted authorities known as Certificate Authorities (CAs). The certificates contain public keys and other identifying information that helps verify the identity of the entities involved in the communication.

    In general, client certificate authentication is part of the mutual TLS authentication process. It is a step where the server asks the client to present its digital certificate for validation. The server allows the client to access its resources when the certificate is valid and trusted. It provides an additional layer of security compared to standard TLS, where only the server is authenticated.

    • Firefox browsers do not accept SSL certificates installed in Internet Explorer browsers. You must install SSL certificates on Firefox browsers separately if your organization allows Firefox browsers. Google Chrome, however, uses the same certificate store as Internet Explorer.
    • Certain client applications, like Dropbox, use a technique called certificate pinning, where the client application is hard coded to accept only one specific client certificate. Apps that use certificate pinning might not work with SSL inspection. They should be included in the list of URL categories for which SSL transactions will not be decrypted.
    • Enable user authentication as well, to allow the service to apply user policies.
    • To see how SSL inspection impacts what policies are enforced by the service, see About Policy Enforcement.
    Close
  • 2. Choose the CA and Configure the Appropriate Root Certificate
  • 3. Install the Certificate to an Application-Specific Trusted Store
  • 4. Configure the SSL Inspection Policy
Related Articles
About Secure Sockets Layer (SSL)About SSL InspectionSupported Cipher Suites in SSL InspectionSafeguarding SSL Keys and Data Collected during SSL InspectionAdding Custom Certificate to an Application-Specific Trust StoreAbout SSL Inspection PolicyConfiguring SSL Inspection PolicyAbout Intermediate CA CertificatesChoosing the CA Certificate for SSL InspectionSigning a CSR Using the Active Directory Certificate ServicesDeploying SSL InspectionConfiguring Software Protection Intermediate CA CertificateConfiguring Cloud HSM Protection Intermediate CA CertificateDeployment Scenarios for SSL InspectionCertificate Pinning and SSL InspectionBest Practices for Testing and Rolling Out SSL Inspection