



Sign in to your Zscaler Private Access (ZPA) Admin Console. Set up Zscaler Private Access (ZPA) for provisioning Users with the Default Access role are excluded from provisioning. When assigning a user to Zscaler Private Access (ZPA), you must select any valid application-specific role (if available) in the assignment dialog. Additional users and/or groups may be assigned later. It is recommended that a single Azure AD user is assigned to Zscaler Private Access (ZPA) to test the automatic user provisioning configuration. Important tips for assigning users to Zscaler Private Access (ZPA) Assign a user or group to an enterprise app.Once decided, you can assign these users and/or groups to Zscaler Private Access (ZPA) by following the instructions here: In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.īefore configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Zscaler Private Access (ZPA). A user account in Zscaler Private Access (ZPA) with Admin permissions.Īssigning users to Zscaler Private Access (ZPA)Īzure Active Directory uses a concept called assignments to determine which users should receive access to selected apps.The scenario outlined in this tutorial assumes that you already have the following prerequisites: For more information on the general Microsoft Azure terms of use for Preview features, see Supplemental Terms of Use for Microsoft Azure Previews. This connector is currently in Public Preview. For important details on what this service does, how it works, and frequently asked questions, see Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory. This tutorial describes a connector built on top of the Azure AD User Provisioning Service.
