{"id":39,"date":"2024-02-12T21:58:19","date_gmt":"2024-02-12T21:58:19","guid":{"rendered":"http:\/\/gigabrit.com\/?p=39"},"modified":"2024-02-12T21:58:20","modified_gmt":"2024-02-12T21:58:20","slug":"building-a-zscaler-lab-part-1-identity-provider","status":"publish","type":"post","link":"https:\/\/gigabrit.com\/?p=39","title":{"rendered":"Building a Zscaler Lab Part 1 (Identity Provider)"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"618\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/EntraID-1024x618.png\" alt=\"\" class=\"wp-image-40\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/EntraID-1024x618.png 1024w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/EntraID-300x181.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/EntraID-768x463.png 768w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/EntraID.png 1092w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Everything in the world of Zero Trust comes down to a few basic ideas. The first and probably most important is Identity. Network and Application access in Clouds has long been primarily controlled strictly based on WHERE a given connection is coming from not WHO is initiating it. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>I won&#8217;t detail the creation of an M365 Tenant here, but for detail sake here&#8217;s what I have. It&#8217;s just a Trial Licensed M365 Business Standard tenant. It comes with everything we need to get the ball rolling. I&#8217;ve activated a custom domain name inside it already. I&#8217;ve also installed and connected the Entra ID Sync tool from my on prem AD Controller and am syncing user accounts. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SAML<\/h2>\n\n\n\n<p>Zscaler\u2019s preferred method for user authentication uses Security Assertion Markup Language (SAML). Though ZIA allows other authentication methods, ZPA only supports SAML. Zscaler supports any SAML 2.0+ (POST Binding) compliant Identity Provider (IdP).<\/p>\n\n\n\n<p>There are many IdPs, however the ones Zscaler sees most often are Azure AD, ADFS, and Okta. This post will focus on integrating authentication with Azure and what it takes to setup Azure as your IdP inside Zscaler.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure1-1024x580.png\" alt=\"\" class=\"wp-image-41\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure1-1024x580.png 1024w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure1-300x170.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure1-768x435.png 768w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure1.png 1291w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In your Azure Tenant, view the Entra ID Overview page, then begin the process of adding your custom domain name.  <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/users\/domains-manage\" data-type=\"link\" data-id=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/users\/domains-manage\">Microsoft Instructions here. <\/a><\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"401\" class=\"wp-image-43\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure2.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure2.png 284w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure2-112x300.png 112w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>Once your custom domain is active and if you are syncing AD resources to Azure , make sure the users and groups are all populated in Entra ID.<\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"139\" class=\"wp-image-44\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure3.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure3.png 681w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure3-300x278.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>Now the fun part begins, building the actual SAML connections to your Zscaler Tenant. <\/p>\n\n\n\n<p>Back on the Entra ID Overview page select the Enterprise Applications option.<\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"171\" class=\"wp-image-45\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure4.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure4.png 463w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure4-264x300.png 264w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>Then select + New Application <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"74\" class=\"wp-image-46\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure5.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure5.png 528w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure5-300x148.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>At the search box for the Catalog of applications, enter &#8220;zscaler&#8221;, then select the correct Zscaler Cloud for your Instance. Click the &#8220;Create&#8221; button to add it. For Zscaler Internet Access on zscalertwo.net select Zscaler Two. <\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"118\" class=\"wp-image-47\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure6.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure6.png 1000w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure6-300x237.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure6-768x606.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>After the Zscaler application is created, select the &#8220;Single Sign-On&#8221; option. Then click the SAML box. <\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"87\" class=\"wp-image-48\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure7.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure7.png 1014w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure7-300x175.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure7-768x448.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"82\" class=\"wp-image-49\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure8.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure8.png 374w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure8-300x164.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>On the Basic SAML Configuration click Edit.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"98\" class=\"wp-image-50\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure9.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure9.png 1097w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure9-300x196.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure9-1024x668.png 1024w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure9-768x501.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>This is where things get a bit more specific. On the Basic SAML Config page, you&#8217;ll need to copy down a few bits of information as you&#8217;ll be copying and pasting information between Azure and your Zscaler Tenant. It&#8217;s a good idea to have a Secure Notepad document that can hold some of this information. <\/p>\n\n\n\n<p>First update the Reply URL (Assertion Consumer Service URL) it&#8217;s conveniently listed where it says &#8220;Patterns&#8221;.<\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"135\" class=\"wp-image-51\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure10.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure10.png 844w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure10-300x269.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure10-768x690.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>Copy the Patterns URL, then select &#8220;Add reply URL&#8221; and paste it there. As well as in the Sign on URL area below. Click &#8220;Save&#8221; at the top, then click the X to close the window. When prompted to Test single sign-on, click &#8220;No, I&#8217;ll test later&#8221;.<\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"70\" class=\"wp-image-52\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure11.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure11.png 770w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure11-300x139.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure11-768x356.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>Scroll down to the SAML Certificates section. Click the Download link for the Certificate (Base64) and save that in your Secure Storage with your other setup information.<\/p>\n\n\n\n<p> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"73\" class=\"wp-image-54\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure12-1.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure12-1.png 1055w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure12-1-300x147.png 300w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure12-1-1024x501.png 1024w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure12-1-768x376.png 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p><strong>IMPORTANT NOTE:<\/strong> Zscaler only supports certificates that end with the .pem extension. So we&#8217;ll need to modify the Base64 certificate from Azure before we can use it in the Zscaler Admin portal. Simply enough, just change the file extension to .pem from .cer <\/p>\n\n\n\n<p>Back on the SAML page, scroll down again, and copy the Login URL, save it in your Notepad for later. <\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"41\" class=\"wp-image-55\" style=\"width: 150px;\" src=\"http:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure13.png\" alt=\"\" srcset=\"https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure13.png 745w, https:\/\/gigabrit.com\/wp-content\/uploads\/2024\/02\/Azure13-300x82.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p>That&#8217;s the Azure side for enabling SAML for Zscaler, next post I will walk through the Zscaler side, which is detailed here in the very useful <a href=\"https:\/\/help.zscaler.com\/zia\/adding-identity-providers\" data-type=\"link\" data-id=\"https:\/\/help.zscaler.com\/zia\/adding-identity-providers\">Zscaler Help site<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everything in the world of Zero Trust comes down to a few basic ideas. The first and probably most important is Identity. Network and Application access in Clouds has long been primarily controlled strictly based on WHERE a given connection is coming from not WHO is initiating it. I won&#8217;t detail the creation of an &hellip; <a href=\"https:\/\/gigabrit.com\/?p=39\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Building a Zscaler Lab Part 1 (Identity Provider)<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-39","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/posts\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gigabrit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=39"}],"version-history":[{"count":4,"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":58,"href":"https:\/\/gigabrit.com\/index.php?rest_route=\/wp\/v2\/posts\/39\/revisions\/58"}],"wp:attachment":[{"href":"https:\/\/gigabrit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gigabrit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gigabrit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}