icon-zia.svg
Secure Internet and SaaS Access (ZIA)

About LDAP User Synchronization

When you configure the Zscaler service to synchronize user information from the directory server to the Zscaler database, it uses Lightweight Directory Access Protocol (LDAP) to synchronize user, group, and department information. For additional information about LDAP, see RFC 2251 Lightweight Directory Access Protocol (v3). It performs an LDAP search based on the configured customer's directory parameters. The Zscaler service imports users who have a user or email attribute and who are part of the domain that is configured for the account. The Zscaler service synchronizes data as follows:

  • It adds users, groups and departments that are in the directory server, but not in the service. It can synchronize up to 128 groups per user.
  • It deletes users, groups and departments that are in the service, but not in the directory server.

Zscaler does not delete but deactivates users. It invalidates the authentication cookies of the users that were deleted and they are no longer allowed to authenticate.

  • It modifies its data to match what's in the directory, if there's a discrepancy between the information that's in the service and in the directory server.

If your organization cannot allow the Zscaler service to connect directly to your internal directory servers or if you want to bypass any firewall constraints on your network, your organization can install an on-site Zscaler Authentication Bridge (ZAB). The ZAB, which is typically located in your DMZ, is an appliance that communicates with your internal directory servers. The Zscaler service communicates only with the ZAB, which then queries your organization's directory server. (For information on obtaining a ZAB, contact your Zscaler representative.)

The Zscaler service by default performs an LDAP query to the directory server to authenticate users whose data was synchronized with a directory server (described in the next section.) You can configure the service to use another authentication method, as described in About Provisioning and Authentication Methods.

Authenticating Synchronized Users

The Zscaler service by default performs an LDAP query to the directory server to authenticate users whose data was synchronized from a directory server. It performs an LDAP BIND to the directory server to validate a user’s password and authenticate a user. Therefore, passwords are always stored and maintained on your directory server. They are never synchronized.

Zscaler highly recommends the option to use secure LDAP, to ensure the privacy of the LDAP communications between the service and your directory server, as shown in the diagram when a user logs in to the Zscaler service:

  1. A synchronized user logs in to the Zscaler service.
  2. The Zscaler Central Authority (CA) searches for the user in the Zscaler database by the login attribute and email address specified by the user.
  3. If the CA finds the user, it displays the password request form.
  4. When the user submits the password request form, the CA retrieves the Distinguished Name and tries to perform an LDAP BIND to the directory server using the Distinguished Name and password of the user.
  5. If the LDAP BIND succeeds, user authentication is successful.

LDAP User Synchronization

To learn more, see Configuring the Zscaler Service to Synchronize Data.

Related Articles
About LDAP User SynchronizationSynchronizing User Data with an Active Directory or OpenLDAPTroubleshooting AD & LDAP Synchronization ErrorsRemoving Disabled Users in the Active Directory from the Zscaler User Database