ZIdentity
Configuring Microsoft Entra ID as an External IdP
This guide provides information on how to configure Microsoft Entra ID as an external identity provider (IdP) for ZIdentity to facilitate single sign-on (SSO) to various Zscaler services for admin access management. You can configure Entra ID as an external IdP to enable SSO to ZIdentity using OpenID Connect (OIDC) or Security Assertion Markup Language (SAML) authentication protocols.
Zscaler and Microsoft are technology partners. To learn more about integrating Zscaler and Microsoft Entra ID, see the Zscaler and Microsoft Entra ID Passwordless Deployment Guide.
Zscaler strongly recommends using OIDC-based integration as it would support new features in the future.
Depending on the authentication protocol, you can provision users to ZIdentity from Entra ID using Just-in-Time (JIT) provisoning or System for Cross-domain Identity Management (SCIM) provisioning.
If you want to leverage step-up authentication, it is recommended to use OIDC-based integrations as most IdPs only support step-up authentication with the OIDC protocol.
- OIDC-Based Authentication via Microsoft Entra Gallery App Integration
This section explains how to configure Microsoft Entra ID as the OpenID Provider (OP) for the ZIdentity via prebuilt app integration to facilitate SSO to various Zscaler services for admin access management.
Prerequisites
Ensure that you have:
- A subscription to Entra ID.
- An existing user directory in Entra ID.
- A ZIdentity account with an admin role that allows you to add an IdP configuration.
A preferred choice of provisioning mode (JIT or SCIM) as this determines the number of apps you need to configure in Entra ID — one app for JIT and two apps for SCIM.
Implementation Differences Between JIT and SCIM Provisioning Modes
Entra ID only supports JIT provisioning for OIDC apps via the Microsoft Entra App Gallery. If you prefer SCIM provisioning with OIDC, you need to create a custom Entra ID app for SCIM, in addition to using the Gallery App for authentication. The following table summarizes the implementation differences for JIT and SCIM:
CloseProvisioning Mode Authentication via Gallery App Provisioning Support Additional Requirements JIT Provisioning Yes Supported by default None SCIM Provisioning Yes Not supported in the Gallery Application Create a custom Entra ID app for SCIM provisioning in addition to using the Gallery App for authentication.
CloseConfiguring Microsoft Entra ID as OP for ZIdentity
To set up Microsoft Entra ID as an OP for ZIdentity:
- 1. Configure app integration using the Zscaler app in the Entra ID gallery.
- Log in to the Entra Admin Center.
- In the left-side navigation, go to Identity > Applications > Enterprise applications.
Click New application.
The Microsoft Entra Gallery window appears.- In the Microsoft Entra Gallery window, search for
zscaler
. Click the Zscaler tile on the search results.
The Zscaler app window appears.
In the Zscaler app window, customize the app name, if needed, and click Create.
The application details page appears.
On the application details page, click Single sign-on and click Go to application.
The App Registration page for Zscaler app appears.
- On the App Registration page:
Copy the Application (Client) ID and save it for future use.
Click Endpoints.
The Endpoints window appears.
In the Endpoints window, locate the OpenID Connect metadata document field, and copy and save the URL for future use.
- In the left-side navigation, go to Manage > Branding & properties.
In the Home page URL field, enter the ZIdentity Admin Portal URL along with the
idp_id
URL parameter. This step is required for enabling the IdP-initiated SSO option for ZIdentity Admin Portal.The value for the
idp_id
URL parameter isdefault
if you are configuring Entra ID as your primary IdP in the ZIdentity Admin Portal. If you are configuring Entra ID as a secondary IdP, the value foridp_id
must be sourced from the final segment of the Redirect URI.Home page URL if Entra ID is configured as your primary IdP in the ZIdentity Admin Portal:
https://
<your_domain>
.zslogin.net/?idp_id=default
Home page URL if Entra ID is configured as your secondary IdP in the ZIdentity Admin Portal:
https://
<your_domain>
.zslogin.net/?idp_id=
<final_segment_from_redirect_URI>
If you are configuring Entra ID as your secondary IdP, update this field with the appropriate
idp_id
value after setting up Entra ID as the IdP in the ZIdentity Admin Portal in the subsequent steps.Click Save.
The configuration is saved, and it takes a few hours for the changes to take effect.
In the left-side navigation, click Certificates & secrets.
The Certificates & secrets window appears.
- On the Certificates & secrets window:
Click New client secret.
The Add a client secret window appears.
In the Add a client secret window, enter a description, and click Add.
The client secret is added and is shown in the Client secrets table.
Copy the client secret value from the Value column and save it for future use.
The client secret value cannot be accessed or viewed after you leave the page.
In the left-side navigation, click API permissions.
The API permissions window appears.
- In the API permissions window:
Click Grant admin consent for <entra_ID_tenant_name>.
To ensure only administrators can accept grants, this configuration is required as it prevents the end users from getting the prompt to accept the grant while logging in to the application.
Click Yes on the Grant admin consent confirmation window.
In the left-side navigation, click Token configuration.
The Token configuration window appears.
- In the Token configuration window:
Click Add optional claim.
The Add optional claim window appears.
In the Add optional claim window:
Select ID as the token type, and from the list of claims, select
email
andpreferred_username
.- Click Add.
The selected claims are added.
Click Add groups claim.
The Edit groups claim window appears.
In the Edit groups claim window:
- Under the Select group types to include in Access, ID, and SAML tokens section, select the Groups assigned to the application option.
Under the Customize token properties by type section, click ID to expand the ID subsection, and select the Group ID option.
The Group ID must be selected as Entra ID does not support sending group names with OIDC protocol when groups are created in the Entra Cloud.
If the group names are received via the Entra ID sync, click the sAMAccountName option instead of the Group ID option to pass on the group names.
- Click Add.
The group claims are added.
In the left-side navigation, click Manifest.
The Manifest window appears.
In the Manifest window, update the required attributes in the graph manifest:
Microsoft is deprecating Azure AD Graphy format in favor of the Microsoft Graph format.
- Using Microsoft Graph Manifest (Recommended)
- Change the value of the
acceptMappedClaims
attribute totrue
. Change the value of the
requestedAccessTokenVersion
attribute to2
.
- Change the value of the
- Using Azure AD Graph Manifest
- Change the value of the
acceptMappedClaims
attribute totrue
. Change the value of the
accessTokenAcceptedVersion
attribute to2
.
- Change the value of the
These changes are required if you are adding any optional claims in a future step.
- Using Microsoft Graph Manifest (Recommended)
Click the OIDC-based Sign-on option on the top to go to the application page.
In the left-side navigation, click Users and groups.
The Users and groups window appears.
In the Users and groups window, select the users and groups that you want to have access to the application.
If you want to pass group memberships as claims, make sure that the groups are assigned instead of individual users in the Users and groups window.
In the left-side navigation, click Single sign-on.
The Single sign-on window appears.
In the Single sign-on window, locate Attributes & Claims, and click the Edit icon.
The Attributes & Claims window appears.
- In the Attributes & Claims window:
In the Attributes & Claims window, click Add new claim.
The Manage claim window appears.
In the Manage claim window:
- Name: Enter
Department
. - Source: Select Attribute.
- Source attribute: Select
user.department
. Click Save.
The Department claim is added. Repeat the preceding steps to add other claims if needed.
- Name: Enter
- 2. Set up Entra ID as an OP for ZIdentity.
- Adding an IdP in the ZIdentity Admin Portal
- Log in to the ZIdentity Admin Portal.
- Go to Integration > External Identities.
- Click Add Primary IdP (or Add Secondary IdP).
The Add Primary Identity Provider or Add Secondary Identity Provider window appears. - On the Basic tab:
Under the General section:
- Name: Enter a name for the IdP.
- Identity Vendor: Select Microsoft Entra ID from the drop-down menu.
- Domain: Select the domain for which the IdP is responsible for authenticating the users. This allows the Zscaler service to display the correct IdP to authenticate an incoming user.
- Protocol: Select OIDC.
- Status: Select Enabled.
Login ID Attribute: Enter an attribute to map it with the Login ID attribute. You can use any attribute that has the email address format e.g., <user_name>@domain.com>. However, Zscaler recommends using the
preferred_username
as the Login ID attribute.- If you are using
email
as the Login ID attribute, ensure that your email domain matches with one of the domains added to ZIdentity for thePrimary Email
attribute. - You can use any email domain for your primary email if you are using any attribute other than email as the source for the Login ID attribute.
- Ensure that the attribute that you enter in the Login ID field matches exactly with the attribute received in the ID tokens.
- If you are using
Under the OIDC Configuration section:
- Paste the OpenID Connect metadata document value copied from the Entra Admin Center to the Metadata URL field and click Fetch.
Copy the Redirect URI value. This value is used in the client application in the Entra Admin Center in the subsequent steps.
If you are configuring Entra ID as the secondary IdP in the ZIdentity Admin Portal, the final segment of the Redirect URI is required for configuring IdP-initiated SSO. Use this value as
idp_id
as part of the Home page URL in the Entra Admin Center.Paste the Client ID and Client Secret values copied from the Entra Admin Center to the respective fields.
In the Entra Admin Center, the value copied from the Application (Client) ID field must be used for the Client ID field, and the value copied from the Value column in the Client secrets tab must be used for the Client Secret field.
- Under Requested Scopes, add
profile
andemail
scopes.
- Click Save.
- Configuring the Platform Settings in the Entra Admin Center
- Go to the Entra Admin Center and go to the client application created for ZIdentity.
- Go to Manage > Authentication.
Under the Platform configurations section, click Add a platform.
The Configure platforms window appears.
In the Configure platforms window:
Click Web.
- Paste the Redirect URI you copied earlier.
- Click Configure.
- Adding an IdP in the ZIdentity Admin Portal
- 3. Provision users for ZIdentity.
This section explains how to provision Entra ID users in the ZIdentity Admin Portal. Currently, Entra ID does not support SCIM provisioning for OIDC apps added via Microsoft Entra App Gallery. Currently, provisioning is supported via Just-in-Time (JIT) provisioning with the gallery application. However if you prefer using SCIM provisioning with OIDC, you need to create a custom app in the Entra ID specifically to support SCIM-based provisioning, in addition to configuring the Microsoft Entra Gallery App for authentication.
- Provisioning via JIT
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Entra ID under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
- Select Enable Just-in-time (JIT) Provisioning.
Enter
groups
as the Just-in-time User Group Attribute and map thePrimary Email
User Attribute with theemail
Just-in-time User Attribute.The mapping of the
Primary Email
attribute is mandatory as it is required for functionalities, such as password resetting and multi-factor authentication.Map other ZIdentity user attributes with the appropriate Entra ID attributes as necessary. By default, the following attributes in ID tokens are mapped with the corresponding user attributes in ZIdentity:
Attribute in ID Tokens Default ZIdentity User Attributes given_name First Name family_name Last Name name Display Name - If the external IdP is configured to send different attributes for
First Name
,Last Name
, orDisplay Name
, then you must map those attributes. For example, if the ID token from the external IdP includesSurname
instead offamily_name
, then you must map it with theLast Name
user attribute in ZIdentity. While mapping attributes, ensure that the attributes that you enter in the Just-in-time Attribute field match exactly with the attributes that would be received in the ID Tokens.
- If the external IdP is configured to send different attributes for
- Click Update.
- Provisioning via SCIM using a Custom App
- Log in to the Entra Admin Center and go to Identity > Applications > Enterprise applications.
Click New application.
In the Browse Microsoft Entra Gallery window that appears, click Create your own application.
The Create your own application window appears.
- In the Create your own application window:
- Enter an application name for the ZIdentity service in the What's the name of your app? field. For example, enter
ZIdentity-OIDC-SCIM
. - Select the Integrate any other application you don't find in the gallery (Non-gallery) option.
- Click Create.
See image.
- Enter an application name for the ZIdentity service in the What's the name of your app? field. For example, enter
- In the ZIdentity Admin Portal, go to Integration > External Identities.
Locate the IdP entry created for Entra ID under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
The Edit Primary IdP (or Edit Secondary IdP) window appears.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
Under the SCIM Configuration section:
- Select Enable SCIM Provisioning.
Copy the SCIM Endpoint URL. This value is used in a subsequent step.
The SCIM Endpoint URL field appears only if the configurations for the IdP in the Basic tab are completed and saved.
- Click Generate Token and Bearer Token value. This value is used in a subsequent step.
- (Optional) Map the SCIM attributes (e.g.,
addresses
) with the corresponding ZIdentity user attribute. This mapping is required only for attributes that need to be mapped to a custom user attribute in ZIdentity. To learn more about the SCIM attributes that require custom attribute mapping, see Understanding SCIM.
- Click Update.
In the Entra Admin Center, go to Identity > Applications > Enterprise applications.
Locate and click the custom application that you created for SCIM provisioning.
The application overview page appears.
In the left-side navigation, click Users and groups.
The Users and groups window appears.
In the Users and groups window, select the users and groups that you want to have access to the application.
If you want to pass group memberships as claims, make sure that the groups are assigned instead of individual users in the Users and groups window.
In the left-side navigation, click Provisioning.
The Provisioning window appears.
- In the Provisioning window:
- Provisioning Mode: Select Automatic from the Provisioning Mode drop-down menu.
- Under the Admin Credentials section:
Tenant URL: Enter the endpoint displayed in the SCIM Endpoint URL field while adding the primary or secondary IdP in the ZIdentity Admin Portal.
The SCIM Endpoint URL field appears only if the configurations for the IdP in the Basic tab are completed and saved.
- Secret Token: Enter the bearer token that you generated and copied from the Bearer Token field while configuring the primary or secondary IdP in the ZIdentity Admin Portal.
- Click Test Connection. The Microsoft Entra ID attempts to connect to the SCIM endpoint. When the connection is successful, a verification message appears. If the attempt fails, error information is displayed, and you must resolve those errors before moving forward.
Click Save after a successful connection.
The provisioning configuration is saved and the Mappings section appears within the Provisioning window.
- Under the Mappings section:
Click the groups attributes mapping.
The Attribute Mapping window appears.
- In the Attributes Mapping window:
- Review the attributes that are synchronized from Microsoft Entra ID to your application.
Verify the group attribute mappings as listed in the following table and change as needed by clicking Edit on an existing attribute or by clicking Add New Mapping.
Zscaler Attribute (Target Attribute) Microsoft Entra Attribute (Source Attribute) Match Objects Using this Attribute displayName displayName Yes externalId objectid members members - Click Save to save the attribute mapping changes.
- Return to the Provisioning screen.
Click the users attribute mapping.
The Attribute Mapping window appears.
- In the Attributes Mapping window:
- Review the attributes that are synchronized from Microsoft Entra ID to your application.
Verify the users attribute mappings as listed in the following table and change as needed by clicking Edit on an existing attribute or by clicking Add New Mapping.
Zscaler Attribute (Target Attribute) Microsoft Entra Attribute (Source Attribute) Match Objects Using this Attribute userName userPrincipalName Yes active Switch([IsSoftDeleted], , "False", "True", "True", "False") displayName displayName emails[type eq "work"].value mail name.givenName givenName name.familyName surname externalid objectid urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department department - Click Save to save the attribute mapping changes.
- Return to the Provisioning screen.
Under the Settings section:
- Send an email notification when a failure occurs: (Optional) Select this and provide an email to receive a notification when there is a provisioning failure.
- Prevent accidental deletion: (Optional) Selecting this option allows you to set an Accidental deletion threshold. When the option is enabled, deleting a number of groups and users over the threshold requires approval from an admin.
- Scope: (Optional) Choose Sync only assigned users and groups. Zscaler recommends using this setting.
- Set the Provisioning Status to On.
See image. - Click Save to start the Microsoft Entra ID provisioning service.
- Provisioning via JIT
- 4. Enabling step-up authentication.
You can configure step-up authentication to extend the existing authentication process by requiring multi-factor authentication (MFA) when needed, ensuring that access to high-risk or sensitive data is protected.
Before configuring step-up authentication, make sure you have configured authentication levels and access policies. To learn more, see Understanding Step-Up Authentication.
To enable step-up authentication:
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Entra ID under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Advanced tab.
Under the Levels to Authentication context mapping section, enter the ACR Claim value for each authentication level. To learn more about the supported ACR Claims in Entra ID, refer to the Microsoft Technical documentation.
Ensure that you map proper ACR claims for each level depending on the hierarchy. The highest level of authentication must be mapped to the ACR value for the strongest context.
- Click Update.
Setting Up IdP-Initiated SSO
You can log in to the ZIdentity Admin Portal via the IdP-initiated flow.
To log in to ZIdentity Admin Portal from the Entra ID's My Apps portal:
- Log in to the Entra ID's My Apps portal.
Locate and click the Zscaler app.
The ZIdentity Admin Portal URL is opened in a new tab or window and you are logged in.
- SAML-Based Authentication
This section explains how to configure Microsoft Entra ID as an identity provider (IdP) for the ZIdentity service. Zscaler recommends configuring the IdP and service provider (SP) simultaneously as configurations are interdependent on each other. To learn more, see Adding SAML Identity Providers.
ClosePrerequisites
Ensure that you have:
- A premium Microsoft Entra ID subscription
- An existing directory in Microsoft Entra ID
- A ZIdentity account with an admin role that allows you to add an IdP configuration
Configuring Microsoft Entra ID as IdP for ZIdentity
To set up Microsoft Entra ID as an IdP for ZIdentity:
- 1. Set up Microsoft Entra ID as an IdP for ZIdentity.
- Log in to the Entra Admin Center and go to Identity > Applications > Enterprise applications from the left-side navigation.
See image. - Click New application, then Create your own application.
- In the Create your own application window, enter an application name for the ZIdentity service in the What's the name of your app? field. For example, enter
ZIdentity
. - Select the Integrate any other application you don't find in the gallery (Non-gallery) option.
Click Create.
See image.The Microsoft Entra ID service displays a notification that the application is added and you are redirected to the application's Overview page.
From the left-side navigation, click Single sign-on, then SAML.
See image.The Set up Single Sign-on with SAML page appears.
In the Basic SAML Configuration section, click Edit and do the following:
- Identifier (Entity ID): Enter the entity ID displayed in the SP Entity ID field when you configure Microsoft Entra ID as an IdP in the ZIdentity Admin Portal. This ID is specific to your IdP.
Reply URL (Assertion Customer Service URL): Enter the URL that is displayed SP URL field when you configure Microsoft Entra ID as an IdP in the ZIdentity Admin Portal.
- Leave the other fields blank.
- Click Save and exit the window.
After saving, you are prompted to test the configuration. Do not test the configuration at this time.
In the User Attributes & Claims section, verify that you have the necessary claims mapped to the attributes.
Map the required attributes in the ZIdentity Admin Portal. The mapping of the
Primary Email
attribute is mandatory as it is required for functionalities, such as password resetting or multi-factor authentication.Click Add a group claim and do the following:
- Which groups associated with the user should be returned in the claim?: Select Groups assigned to the application.
- Source attribute: Select Cloud-only group display names.
- Enable the Customize the name of the group claim option.
- Name (required): Enter a name for the group attribute.
- Click Save and exit the window.
Map this attribute to the User Group SAML Attribute field in the ZIdentity Admin Portal when configuring Microsoft Entra ID as an IdP.
Depending on how you want to provide the IdP inputs when configuring Microsoft Entra ID as an IdP in the ZIdentity Admin Portal, complete one of the following actions:
- Metadata URL
From the SAML Signing Certificate section, copy the URL displayed in the App Federation Metadata Url field. Paste this metadata URL in the IdP Metadata URL field in the ZIdentity Admin Portal when configuring Microsoft Entra ID as an IdP.
- Upload Metadata
From the SAML Signing Certificate section, for the Federation Metadata XML field, click the Download link to obtain the metadata file. Upload this IdP metadata to the IdP Metadata field in the ZIdentity Admin Portal when configuring Microsoft Entra ID as an IdP.
Close - Enter Manually
From the Set up section, copy the Microsoft Entra Identifier and Login URL values. Paste these values in IdP Issuer URI and IdP Single Sign-On URL fields respectively in the ZIdentity Admin Portal when configuring Microsoft Entra ID as an IdP.
From the SAML Signing Certificate section, download Certificate (base64). Upload this certificate to the IdP Certificate field in the ZIdentity Admin Portal when configuring Microsoft Entra ID as an IdP.
Ensure the certificate file name:
- Has a .
pem
extension (e.g., rename it toentra
.pem). The ZIdentity service only accepts certificates with the .pem
extension. - Contains only one period (".").
By default, Windows hides extensions for known file types.
- Change the Windows Folder Properties to View and Edit Extensions
- Start Windows 10 Control Panel.
- Go to Appearance & Personalization > File Explorer Options.
- When the File Explorer Options window appears, click the View tab.
In Advanced settings:, deselect Hide extensions for known file types to view extensions.
- Rename the certificate to change the extension.
- Has a .
- Metadata URL
- (Optional) If you want to enable the SAML request and response signing options in the ZIdentity Admin Portal, go to the Advanced tab, and do the following:
- Enable SAML Request Signing.
Signing Algorithm: Select SHA-256 from the drop-down menu.
Under SP SAML Certificate, click Download Certificate.
The Service Provider (SP) SAML Certificate is downloaded to your system as a PEM file. Rename this file and change the file extension from
.pem
to.cer
.- Select Encrypted SAML Assertion.
Under SAML Encryption Certificate, click Download Certificate.
The SAML Encryption Certificate is downloaded to your system as a PEM file. Rename this file and change the file extension from
.pem
to.cer
.- Click Update.
- Go to the Entra Admin Center and go to the application created for ZIdentity.
To complete the SAML Request Signing configuration, go to Manage > Single sign-on, and click the Edit icon for the Verification certificates (optional) section.
In the Verification Certifcation window:
- Select Require verification certificates.
Click Upload certificate and upload the SP SAML Certificate file downloaded from the ZIdentity Admin Portal.
Ensure that the SP SAML Encryption Certificate was renamed by changing the file extension from
.pem
to.cer
before uploading.- Click Save.
The Verification Certificate is uploaded to the Entra Admin Center.
- To complete the Encrypted SAML Assertion configuration, go to Security > Token encryption.
Click Import Certificate and upload the SAML Encryption Certificate file downloaded from the ZIdentity Admin Portal.
Ensure that the SAML Encryption Certificate file was renamed by changing the file extension from
.pem
to.cer
before uploading.In the left-side navigation, go to Manage > Single Sign-on, and click the Edit icon for the SAML Certificates section.
In the SAML Signing Certificate window:
- Signing Option: Select Sign SAML response and assertion from the drop-down menu.
- Signing Algorithm: Select SHA-256 from the drop-down menu,
- Click Save.
The configuration in the Azure Portal is completed. Finish the IdP configuration in the ZIdentity Admin Portal to set up Microsoft Entra ID as an IdP for ZIdentity.
Assigning Users and Groups to ZIdentity
To assign users to the ZIdentity service:
- Go to Identity > Applications > Enterprise applications from the left-side navigation.
- Search and open the ZIdentity application.
From the left-side navigation, click Users and groups, then Add user/group.
See image.The Users and groups window appears.
- Search for the user or group you want to assign to ZIdentity service.
Select the checkbox next to the user or group names you want to assign to the ZIdentity service, then click Select.
See image.If you want to pass group memberships as claims, make sure that the groups are assigned instead of individual users in the Users and groups window.
In the Add Assignment panel, click Assign.
You are redirected to the Users and groups page where you can see the users are successfully assigned to ZIdentity.
- Log in to the Entra Admin Center and go to Identity > Applications > Enterprise applications from the left-side navigation.
- 2. Provision users for ZIdentity.
This section provides information on how to set up Microsoft Entra ID to use System for Cross-Domain Identity Management (SCIM) in ZIdentity. SCIM allows you to quickly remove, manage, or add users to ZIdentity. Before you proceed, ensure that you have the Enable SCIM Provisioning option selected when configuring Microsoft Entra ID as an IdP in the ZIdentity Admin Portal.
Optionally, map the SCIM attributes (e.g.,
addresses
) with the corresponding ZIdentity user attribute. This mapping is required only for attributes that need to be mapped to a custom user attribute in ZIdentity. To learn more about the SCIM attributes that require custom attribute mapping, see Understanding SCIM.To configure SCIM in Microsoft Entra ID:
- Log in to the Entra Admin Center and go to Identity > Applications > Enterprise applications.
See image. Locate and click the ZIdentity application that you created.
The application overview page appears.
In the left-side navigation, click Provisioning.
The Provisioning window appears.
- In the Provisioning window:
- Provisioning Mode: Select Automatic from the Provisioning Mode drop-down menu.
- Under the Admin Credentials section:
Tenant URL: Enter the endpoint displayed in the SCIM Endpoint URL field while configuring the primary or secondary IdP in the ZIdentity Admin Portal.
The SCIM Endpoint URL field appears only if the configurations for the IdP in the Basic tab are completed and saved.
- Secret Token: Enter the bearer token that you generated and copied from the Bearer Token field while configuring the primary or secondary IdP in the ZIdentity Admin Portal.
- Click Test Connection. The Microsoft Entra ID attempts to connect to the SCIM endpoint. When the connection is successful, a verification message appears. If the attempt fails, error information is displayed, and you must resolve those errors before moving forward.
Click Save after a successful connection.
See image.The provisioning configuration is saved and the Mappings section appears within the Provisioning window.
- Under the Mappings section:
Click the groups attributes mapping.
The Attribute Mapping window appears.
- In the Attributes Mapping window:
- Review the attributes that are synchronized from Microsoft Entra ID to your application.
Verify the group attribute mappings as listed in the following table and change as needed by clicking Edit on an existing attribute or by clicking Add New Mapping.
Zscaler Attribute (Target Attribute) Microsoft Entra Attribute (Source Attribute) Match Objects Using this Attribute displayName displayName Yes externalId objectid members members - Click Save to save the attribute mapping changes.
- Return to the Provisioning screen.
Click the users attribute mapping.
The Attribute Mapping window appears.
- In the Attributes Mapping window:
- Review the attributes that are synchronized from Microsoft Entra ID to your application.
Verify the users attribute mappings as listed in the following table and change as needed by clicking Edit on an existing attribute or by clicking Add New Mapping.
Zscaler Attribute (Target Attribute) Microsoft Entra Attribute (Source Attribute) Match Objects Using this Attribute userName userPrincipalName Yes active Switch([IsSoftDeleted], , "False", "True", "True", "False") displayName displayName emails[type eq "work"].value mail name.givenName givenName name.familyName surname externalid objectid urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department department - Click Save to save the attribute mapping changes.
- Return to the Provisioning screen.
Under the Settings section:
- Send an email notification when a failure occurs: (Optional) Select this and provide an email to receive a notification when there is a provisioning failure.
- Prevent accidental deletion: (Optional) Selecting this option allows you to set an Accidental deletion threshold. When the option is enabled, deleting a number of groups and users over the threshold requires approval from an admin.
- Scope: (Optional) Choose Sync only assigned users and groups. Zscaler recommends using this setting.
- Set the Provisioning Status to On.
See image. - Click Save to start the Microsoft Entra ID provisioning service.
- Log in to the Entra Admin Center and go to Identity > Applications > Enterprise applications.
IdP-Initiated SSO for ZIdentity Tenants Enabled with Experience Center
In Experience Center-enabled tenants, during the IdP-initiated SSO flow, the user is redirected to Experience Center by default. To change this and ensure the user is redirected to ZIdentity you must configure the
zidServiceId
attribute in Entra ID.- See steps to configure the attribute
To configure the attribute in Entra ID:
- Log in to the Entra Admin Center.
- Go to Identity > Applications > Enterprise applications.
- Locate the application created for ZIdentity and open it.
- Go to Manage > Single sign-on.
Locate the Attributes & Claims section, and click Edit.
In the Attributes & Claims page, click Add new claim.
- In the Manage Claim page:
- Enter
zidServiceId
as the attribute name. - Under Claim conditions, configure administrator groups for which you want to send the claim:
- Select Members from the User type drop-down menu.
- Click Select groups under the Scoped Groups column, and select the administrator groups for which you want to send the claim.
- Select Attribute from the Source drop-down menu.
Enter
800000000103
as the Value. This value is the same for all tenants.- Click Save.
- Enter