Identity and Access Management Integration

Integrate a supported IAM system with Zero Trust Secure Access and grant the required permissions.

Zero Trust Secure Access supports the following IAM systems:

You must grant certain permissions within your IAM system to enable Zero Trust Secure Access to monitor user sign-in attempts, access user data, and perform actions on user accounts. To enable user authentication for Private Access and Internet Access, you must configure SAML-based single sign-on (SSO) for your IAM system.

Note:

Zero Trust Secure Access only supports SSO for one IAM system at a time.

Table 1. Permission Requirements

Purpose

Permission

Data Upload

Policy Enforcement

Access user profiles and activity data for risk analysis

Yes

-

Take direct action on user accounts that violate policy rules (for example, Disable User Account, Force Sign Out, Force Password Reset)

Yes

Yes

Private Access authentication (SSO)

Yes

-

Internet Access authentication (SSO)

Yes

-