/

Zscaler

Zscaler

The Zscaler integration configures 1Kosmos as a SAML 2.0 identity provider, enabling biometric authentication before Zscaler enforces security policies and application access controls based on verified user identity.

Integration type

SSO

Updated

Overview

Zscaler is a cloud security platform whose products (ZIA and ZPA) require user authentication to enforce security policies and control application access. 1Kosmos integrates as a SAML 2.0 identity provider, enabling biometric authentication via the 1Kosmos mobile app before Zscaler applies policies based on verified user identity.

The SAML identity provider is configured in the ZIA Admin Portal under Administration → Authentication Settings. Zscaler supports uploading SP metadata from the Add IdP window, which can be imported into AdminX to complete the trust configuration. Zscaler's SP ACS URL follows the pattern https://[cloud-name].zscaler.net/auth, where the cloud name is the specific Zscaler cloud your organization is provisioned on.

Zscaler supports SP-initiated SSO only. Users must authenticate through the Zscaler portal or through the Zscaler client before their internet traffic is subject to Zscaler's security policies.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Zscaler ZIA or ZPA administrator access: Admin access to the Zscaler Admin Portal with permissions to configure Authentication Settings and Identity Providers.

  • Zscaler cloud name: Know which Zscaler cloud your organization uses (e.g., zscaler.net, zscloud.net, zscalertwo.net). This determines the SP ACS URL pattern. Available in your ZIA Admin Portal URL.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Zscaler:

Field

Where to find it

SAML Portal URL (SSO URL)

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

IdP SAML Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Zscaler SP values to collect for AdminX:

Field

Where to find it

SP Metadata XML

ZIA Admin Portal → Administration → Authentication Settings → Identity Providers → Add IdP → Download Service Provider Metadata

SP ACS URL (approximate pattern)

https://[cloud-name].zscaler.net/auth (confirm exact URL from SP metadata)

Integration steps

Step 1: Download Zscaler SP metadata

  • Log in to the ZIA Admin Portal and navigate to Administration → Authentication Settings.

  • Click the Identity Providers tab and click Add IdP.

  • In the Add IdP window, before configuring any fields, click to download the SP Metadata file (zscaler-metadata.xml). This file contains the Zscaler SP Entity ID and ACS URL needed for AdminX.

Step 2: Add Zscaler as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Select SAML 2.0 Generic and click Add integration. Enter "Zscaler" as the Application Name and the Zscaler login URL for your organization as the Application Access URL.

  • Set NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email. Add claims for email, DisplayName, and memberOf (groups, if applicable). Enable Assertion signing.

  • Import the Zscaler SP metadata XML file or manually enter the SP Entity ID and ACS URL from the metadata. Click Save.

Step 3: Complete the IdP configuration in Zscaler

  • Return to the Add IdP window in the ZIA Admin Portal.

  • Enter a name for the identity provider (e.g., "1Kosmos").

  • In the SAML Portal URL field, paste the 1Kosmos SSO URL.

  • Enter the Login Name Attribute that maps to the SAML attribute Zscaler should use as the user identifier (typically email or userPrincipalName).

  • Upload the 1Kosmos SAML signing certificate in base-64 encoded PEM format (.pem extension, no periods other than the extension).

  • Under Authentication Frequency, set the frequency at which users must re-authenticate.

  • Set Authentication Type to SAML. Click Save.

  • Click Activate in the Zscaler Admin Portal to activate the configuration changes.

Step 4: Test the integration

  • Navigate to your Zscaler login URL and sign in using the SAML option.

  • Confirm you are redirected to 1Kosmos. Authenticate biometrically and confirm you are authenticated with Zscaler and subject to your organization's internet security policies.


Attribute mappings

Source (1Kosmos)

Target (Zscaler)

Description

user.email

Login Name Attribute / NameID

Primary identifier for Zscaler user policy assignment

user.displayName

DisplayName

User display name in Zscaler logs and reports

user.groups (optional)

memberOf

Group membership for group-based policy enforcement in Zscaler

Integration notes

Zscaler activates configuration changes through an explicit Activate step in the admin portal. Configuration changes saved but not activated are not applied to user authentication.

Always click Activate after saving IdP configuration changes. The Zscaler certificate upload requires the PEM file to have no periods in the filename other than the .pem extension. Renaming a certificate file downloaded from AdminX to comply with this restriction is common.

If SCIM provisioning is needed alongside SAML for automatic user account sync, enable SCIM in Zscaler after activating SAML; do not enable both SAML Auto-Provisioning and SCIM simultaneously, as they conflict.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.