Client Connector
Configuring Automatic ZPA Reauthentication
You can enable Zscaler Client Connector to automatically attempt reauthentication for users with Zscaler Private Access (ZPA). This article describes how to configure automatic ZPA reauthentication.
This feature is only available for Zscaler Client Connector version 3.0 and later for Windows and macOS.
Prior to configuring automatic ZPA reauthentication, you must:
- Configure your IdP for single sign-on (SSO).
- Enable Integrated Windows Authentication (IWA).
Enabling IWA
After you configure your organization's IdP, you can enable IWA on the following browsers. Select a browser to learn more.
While IWA works with most browsers, it does not work over some HTTP proxy servers.
- Internet Explorer version 2.0 and later
To enable IWA using Internet Explorer:
- Select Internet options in the Tools drop-down menu.
- On the Advanced tab under Security, select Enable Integrated Windows Authentication*.
- On the Security tab, click Local intranet > Sites > Advanced.
- Add the SSO domain.
- Click Close.
- Mozilla Firefox
Enabling IWA on Mozilla Firefox depends on your OS.
To enable IWA on Mozilla Firefox for Windows:
- Start
about:config
:- In the URL field, enter
about:config
and pressEnter
. - Click Accept the Risk and Continue.
- In the URL field, enter
- Configure
network.negotiate-auth.trusted-uris
:- In the Search preference name field, enter
negotiate
. - Click the Edit icon for
network.negotiate-auth.trusted-uris
. - Add the SSO domain.
- Press
Enter
or click the checkmark.
- In the Search preference name field, enter
- Configure
network.automatic-ntlm-auth.trusted-uris
:- In the Search preference name field, enter
automatic
. - Click the Edit icon for
network.automatic-ntlm-auth.trusted-uris
. - Add the SSO domain.
- Press
Enter
or click the checkmark.
- In the Search preference name field, enter
To enable IWA on Mozilla Firefox for macOS:
- Start
about:config
:- In the URL field, enter
about:config
and pressEnter
. - Click Accept the Risk and Continue.
- In the URL field, enter
- Configure
network.negotiate-auth.delegation-uris
:- In the Search preference name field, enter
negotiate
. - Click the Edit icon for
network.negotiate-auth.delegation-uris
. - Add the SSO domain.
- Press
Enter
or click the checkmark.
- In the Search preference name field, enter
- Configure
network.automatic-ntlm-auth.trusted-uris
:- In the Search preference name field, enter
automatic
. - Click the Edit icon for
network.automatic-ntlm-auth.trusted-uris
. - Add the SSO domain.
- Press
Enter
or click the checkmark.
- In the Search preference name field, enter
- Configure
network.automatic-ntlm-auth.allow-proxies
:- In the Search preference name field, enter
automatic
. - Click the gray toggle for
network.automatic-ntlm-auth.allow-proxies
to set this value to true.
- In the Search preference name field, enter
- Configure
network.negotiate-auth.allow-proxies
- In the Search preference name field, enter
negotiate
. - Click the gray toggle for
network.negotiate-auth.allow-proxies
to set this value to true.
- In the Search preference name field, enter
- Start
- Google Chrome version 8.0 and later
For Windows and macOS, IWA is automatically enabled on Google Chrome and this function is allowlist-driven. The only way to change the policy is through the command prompt (Windows) or terminal window (macOS).
To change the policy in Windows:
- Enter
cmd
into the search field on your taskbar to start the command prompt. - Configure the allowlist using the following command-line parameter:
--auth-server-whitelist="https://www.example.com"
.Use a comma to separate between multiple domains.
To change the policy in macOS:
- Start the terminal application.
- Create a Kerberos ticket for the account using the following command:
kinit username@example.com
. - Replace
username@example.com
with your username and domain. When prompted, enter your password. - Configure the allowlist using the following command-line parameter:
$ defaults write com.google.Chrome AuthServerWhitelist "httpsL//www.example.com, https://www.example2.net, https://www.example3.org"
.
Use a comma to separate between multiple domains.
Close - Enter
- Safari, after you obtain a Kerberos ticket
For Mac devices running OS X, IWA is enabled automatically for Safari.
Close - Microsoft Edge version 77 and later
To enable IWA on Microsoft Edge:
- In the Windows Control Panel, select Network and Internet > Internet Options.
- Click the Security tab and click Local Intranet > Sites.
- Click Advanced.
- In the Add this website to the zone field, enter the SSO domain.
- Click Add.
- Click Close.
Admins use their organization's preferred method to enable IWA for all users. For example, an admin might use Microsoft Group Policy Object (GPO) to enable IWA for all their users. To learn more, see Kerberos Trust Relationship Configuration Guide for Windows Server 2012 & GPO Push.
Configuring Automatic ZPA Reauthentication
After you've configured your IdP for SSO and enabled IWA, you can configure automatic ZPA reauthentication:
- In the Zscaler Client Connector Portal, go to Administration and select Client Connector Support.
- On the App Supportability tab:
- Select Automatically Attempt ZPA Reauthentication to allow users to continue to access ZPA. When enabled, this setting is applied upon enrollment to Zscaler Client Connector.
- From the Timeout for Automatic ZPA Reauthentication (in seconds) drop-down menu, select the time it takes for the browser to automatically reauthenticate. The default is 30 seconds. You can also select 60, 90, or 120 seconds.
- Click Save.
If automatic reauthentication is unsuccessful, users are prompted to reauthenticate with their credentials using Zscaler Client Connector.
