F Zscaler Zero Trust Network Access (ZTNA) – Complete Architecture & Configuration Guide - The Network DNA: Networking, Cloud, and Security Technology Blog

Zscaler Zero Trust Network Access (ZTNA) – Complete Architecture & Configuration Guide

Home Security Zscaler ZTNA Guide

Last Updated: March 2026  |  Network Security  |  ⏱ 10-min read


Traditional network security was built around a single, flawed assumption — that everything inside the corporate perimeter can be trusted. This model relied on firewalls, VPNs, and MPLS circuits to create a "trusted network" and route all traffic through centralized data centers. The result was an architecture that is rigid, operationally complex, and increasingly a barrier to digital transformation. Zscaler Zero Trust Network Access (ZTNA) eliminates this outdated model entirely, replacing it with a cloud-native platform where business policies — not network location — determine who can access what, from anywhere.

Zscaler Zero Trust Network Access (ZTNA) – Complete Architecture & Configuration Guide

In this article, we cover every major component of the Zscaler Zero Trust Exchange — from ZIA and ZPA to identity provisioning, client connectivity, security policy enforcement, and analytics — with practical configuration context drawn from real lab deployments.

1. Traditional VPN vs. Zero Trust Architecture

The fundamental difference between legacy and zero trust approaches comes down to one question: what do you protect? Traditional network-centric security protects the network itself — securing the perimeter so that anyone inside it can move freely. Zero Trust protects the application, meaning access is granted per-application, per-user, per-session, regardless of where the user sits on the network.

✘ Legacy Firewall-Centric Model

  • Trusted network routes users through data centers
  • MPLS, IPSec VPN, and hub-and-spoke topology
  • Broad network access once inside the perimeter
  • Rigid, complex, and creates lateral movement risk
  • Barrier to cloud adoption and digital transformation

✔ Zero Trust Architecture

  • Business policies determine who accesses what
  • Users connect to specific apps — not the network
  • Zero Trust Exchange acts as the security broker
  • Agile, simple, and secure by design
  • Actively enables business transformation

In the legacy model, a compromised user or device inside the perimeter can traverse the entire network. In the Zero Trust model, that same compromised credential can reach only the specific application it was authorized for — dramatically limiting the blast radius of any breach.

2. Zscaler Zero Trust Exchange – ZIA, ZPA & ZDX

The Zscaler Zero Trust Exchange is a cloud-native platform that replaces legacy hardware — VPN concentrators, firewalls, load balancers, and DDoS appliances — with a global, policy-driven security layer. It is built on three integrated pillars, each serving a distinct purpose:

Zscaler Internet Access (ZIA) — "Block the bad, protect the good"

ZIA provides secure access to the internet and SaaS applications through full inline content inspection at SSL scale. Powered by AI-driven threat protection, it replaces Secure Web Gateway (SWG) appliances and virtual firewalls with a cloud-delivered security stack that covers every user on every device — regardless of location.

Zscaler Private Access (ZPA) — "Connect to apps, not networks"

ZPA enables secure access to private internal applications without requiring a traditional VPN. Users connect only to the specific authorized application — not the underlying network. This eliminates lateral movement risk entirely and removes the need for VPN concentrators, internal load balancers, and inbound firewall rules. ZPA is the primary engine for implementing ZTNA at enterprise scale.

Zscaler Digital Experience (ZDX) — "Ensure a great user experience"

ZDX provides end-to-end visibility into user experience and application performance across any user, device, or location. It monitors the complete path — endpoint health, network latency, application responsiveness — allowing IT teams to proactively identify and resolve performance degradation before it impacts productivity.

3. Identity Management – SAML & SCIM

Zero Trust is identity-first by design. Before any user can access an application through the Zscaler platform, their identity must be verified by a trusted Identity Provider (IdP). Zscaler integrates with any SAML 2.0-compatible IdP — including Okta, Azure AD, Google Workspace, PingOne, and OneLogin — acting as the Service Provider (SP) in the relationship.

SAML Authentication Flow

SAML (Security Assertion Markup Language) is the standardized protocol that enables this identity verification without requiring the user to re-authenticate at every application. The 9-step flow works as follows: the user requests an application → Zscaler (SP) redirects them to the IdP → the user authenticates at the IdP → the IdP issues a cryptographically signed Security Assertion → Zscaler validates the assertion and issues an access token → the user is granted access to the specific application. The underlying network is never exposed at any point in this flow.

Component Role Example
Identity Provider (IdP) Security checkpoint — verifies the user's identity Okta, Azure AD, Google Workspace
Service Provider (SP) The "door" to the app — Zscaler acts as the SP Zscaler ZIA / ZPA portal
Security Assertion Digitally signed token carrying user attributes Username, Department, Group membership

SCIM – Automated User Provisioning

SCIM (System for Cross-domain Identity Management) automates the entire user lifecycle — create, update, and delete — across all connected systems simultaneously. Without SCIM, IT must manually create accounts in every system each time an employee joins, changes roles, or leaves. With SCIM enabled in the Zscaler console, adding a user to the primary directory (e.g., Google Workspace) automatically propagates their account to Zscaler, Salesforce, Office 365, and all other integrated platforms within minutes. This eliminates human error, reduces provisioning time from hours to seconds, and ensures access is revoked instantly when an employee departs.

In the Zscaler Admin Console, SAML and SCIM are configured together under the Edit IdP menu. The administrator defines the SAML Portal URL, Entity ID, and uploads the IdP certificate to establish trust. Once SCIM is enabled, attribute mapping rules (such as First Name → DisplayName, Department → Department) automate ongoing user synchronization.

4. Zscaler Client Connector (ZCC)

The Zscaler Client Connector (ZCC) is the lightweight endpoint agent that forms the bridge between the user's device and the Zscaler Zero Trust Exchange. Provided at no additional charge, ZCC intelligently routes traffic to Zscaler regardless of the user's network location — office, home, coffee shop, or hotel. It performs three critical functions simultaneously:

  • Threat Protection: Routes internet traffic through ZIA for full inline inspection and malware blocking before it reaches any external site.
  • Secure Connectivity: Provides seamless, VPN-free access to internal private applications via ZPA tunnels — the user simply opens their application as if they were in the office.
  • Endpoint Monitoring: Acts as a ZDX probe, continuously gathering device health, network path quality, and application performance data for visibility and troubleshooting.

ZCC configuration is managed through three layered profile types in the ZCC Admin Console:

  • Forwarding Profiles: Define how traffic is handled (Tunnel, Tunnel with Local Proxy, or None) depending on network context — On-Trusted Network, VPN-Trusted Network, or Off-Trusted Network.
  • Device Posture Profiles: Enforce endpoint compliance checks before granting access — verifying OS version, confirming specific security processes are running (e.g., an antivirus executable like Sophos), and validating signer certificates.
  • Application Profiles: The master policy that binds a Forwarding Profile and Device Posture Profile together and applies them to designated user groups, also controlling security settings like logout/exit passwords.

5. Zscaler Internet Access (ZIA) – Policies & Security

ZIA operates through a distributed, cloud-based topology where an Admin Portal pushes policy to a Central Authority, which synchronizes rules to geographically distributed ZIA Public Service Edges in real time. When a user opens a browser, the PAC (Proxy Auto-Configuration) file mechanism automatically selects the closest Service Edge, routes traffic through it for inspection, and forwards clean traffic to the internet. Log data is extracted continuously from Service Edges to dedicated Log Routers and Nanolog Clusters for auditing and compliance.

The ZIA Admin Dashboard organizes security policies into four major categories:

URL & Cloud App Control Filtering

Rules are evaluated in numerical order — lower rule numbers take priority. Cloud App Control policies always override standard URL policies. Each rule can target specific users, protocols, request methods, and URL categories (such as Adult Material, Gambling, or File Hosting). The invisible default policy is to allow all traffic that does not match an explicit rule, making it critical to configure blocking rules proactively.

File Type Control

Granular control over file-sharing behavior per user and per cloud application. Administrators can configure separate actions for uploading, downloading, viewing, editing, and deleting — for example, allowing users to view documents on a PDF platform while blocking uploading entirely for the same application. This is particularly valuable for preventing sensitive data exfiltration through consumer cloud storage.

SSL Inspection

Over 90% of modern internet traffic is encrypted over HTTPS. Without SSL inspection, security controls are entirely blind to threats hidden inside encrypted sessions. Zscaler transparently intercepts HTTPS connections, decrypts them using the Zscaler Intermediate Root CA (which must be trusted by endpoint devices), performs full content inspection, then re-encrypts the traffic before delivering it to the user. This is the critical foundation that makes malware detection, DLP, and URL filtering effective against encrypted threats.

Malware & Advanced Threat Protection

The Malware Protection policy inspects both inbound and outbound traffic across HTTP, HTTPS, and FTP protocols for known malware signatures, spyware, and adware. When a threat is detected, the user receives a clear block page — for example, "Threat found: Virus" — with organizational branding and support contact information. Real-time enforcement is validated using the EICAR test file, a standard harmless test string that triggers antivirus signatures.

 ZIA Security Policy Quick Reference

  • Cloud App Control policies always take precedence over URL filtering rules
  • Rules are evaluated top-down — the first match wins and evaluation stops
  • The default policy (not visible in the UI) is to allow all unmatched traffic
  • SSL Inspection must be enabled for malware scanning to work on HTTPS traffic
  • The Zscaler Root CA must be deployed to all endpoints via MDM or Group Policy

6. Zscaler Private Access (ZPA) – Implementing ZTNA

ZPA is the cornerstone of Zscaler's ZTNA implementation, purpose-built to replace the traditional enterprise VPN. It works by deploying lightweight App Connectors inside the data center, cloud environment (AWS, Azure, GCP), or any private network where applications reside. These connectors establish outbound-only connections to the Zero Trust Exchange — meaning no inbound firewall rules are required and the application servers are never exposed to the internet.

ZPA supports four primary use cases that cover the full range of enterprise access requirements:

  • Remote Access Without VPN: Secure workforce access including contractors, with the fastest direct path to each application — no backhauling through a central hub.
  • Zero Trust for On-Premises Users: Even users inside the corporate office receive the same zero trust experience — apps and users are on logically separate networks even when physically co-located.
  • Direct App Access in Public Clouds: Eliminates the need for data-center-to-cloud direct connect circuits or virtual DMZs.
  • Third-Party App Access: B2B customers, suppliers, and partners can be granted access to specific applications without being given network-level access, dramatically improving security for third-party interactions.

ZPA Policy Architecture

ZPA security rules are applied at the logical application layer, not the infrastructure layer. Policies target Application Segments and Segment Groups — not App Connector Groups or Server Groups directly. This application-centric model means that infrastructure changes (adding or replacing connectors) do not require policy rewrites.

Three policy types govern all ZPA traffic:

  • Access Policies: Define which users can reach which application segments, validated against SAML and SCIM attributes (username, group, department) and device posture requirements.
  • Timeout Policies: Control how long an idle or active session can remain open before requiring re-authentication.
  • Client Forwarding Policies: Determine how ZCC routes traffic destined for specific private applications.

A production ZPA policy can enforce multiple simultaneous requirements in a single rule — for example: the user must be marcel.widya@dipostar.com, the device must be running Windows 10 or 11 with a verified posture check, AND the device must have Sophos EDR actively running as confirmed by ZCC's Device Posture profile. All three conditions must be met before the Zero Trust Exchange establishes the app tunnel.

7. Analytics, Logging & Troubleshooting

Zscaler's analytics layer provides a single pane of glass for both ZIA and ZPA environments, giving administrators real-time and historical visibility into every transaction across the entire Zero Trust Exchange.

ZIA Web Overview Dashboard

The ZIA Dashboard's Web Overview section visualizes network activity over a configurable time period (default 24 hours). Donut charts break down Cloud Application Classes by consumed bytes and Top URL Categories by transaction count. Bar charts identify the top bandwidth consumers by user and track specific application classes like Social Networking and Streaming Media. A dedicated Top Advanced Threats widget instantly surfaces any intercepted malicious activity.

ZIA Insights Logs — Transaction-Level Forensics

The Insights Logs interface is the primary forensic tool for investigating individual web transactions. Administrators can filter by user, timeframe, location, URL category, or policy action to isolate specific events. Each log entry shows the precise event time, the user's location (e.g., Road Warrior for remote users), the exact URL accessed, the URL category, and the policy action applied (Allowed, Blocked, or Dropped). This granularity makes it straightforward to investigate a user complaint, prove policy enforcement to auditors, or identify the exact moment a security incident occurred.

ZPA Diagnostics — End-to-End Connection Troubleshooting

The ZPA Diagnostics dashboard provides a top-level transaction summary showing total connections, errors, Access Policy blocks, Timeout Policy blocks, and successful sessions. Expanding any individual log entry reveals the complete data path broken into six logical sections: Connection (start/end time, status code, duration), Policy (access policy name, action, approval ID), User (username, IP address, session type), Service Edge (name, location, control service edge), App Connector (name, location, connection setup time), and Application (port, protocol, application segments, server details). Internal status codes like BRK_MT_TERMINATED provide precise failure categorization for escalation to Zscaler support.

Tool Platform Primary Use
Web Overview Dashboard ZIA Traffic trends, app usage, threat summary
Insights Logs ZIA Per-user transaction forensics, policy audit
Diagnostics Dashboard ZPA Session errors, policy blocks, connection path
Submit a Ticket / Help Portal ZPA Admin Portal Escalate unresolved issues to Zscaler support

8. Conclusion

Zscaler Zero Trust Network Access represents a fundamental architectural shift — from a network-centric perimeter model that implicitly trusts everything inside, to an identity-first, application-centric model that verifies every user, every device, and every session before granting the minimum necessary access. The platform achieves this through a tight integration of ZIA for internet security, ZPA for private application access, ZCC for endpoint connectivity, and SAML/SCIM for identity federation.

For organizations evaluating or deploying ZTNA, the key operational takeaways are clear: configure SAML and SCIM together from day one to ensure consistent user provisioning, deploy ZCC with well-defined Forwarding and Device Posture profiles before enabling application policies, enable SSL inspection early since it is the foundation for all content-based security controls, and leverage the Insights Logs and ZPA Diagnostics tools continuously — not just during incidents — to maintain a clear picture of what users are doing and how policies are performing.

 Key Takeaways

  • Zero Trust connects users to apps, not to networks — eliminating lateral movement risk
  • ZIA secures internet/SaaS access; ZPA replaces VPN for private app access; ZDX monitors experience
  • SAML handles authentication; SCIM automates user lifecycle management across all connected platforms
  • ZCC is the unified endpoint agent tying together internet security, private access, and digital experience monitoring
  • SSL Inspection is mandatory for effective malware detection — without it, security controls are blind to HTTPS threats
  • ZPA policies are application-centric, not infrastructure-centric — targeting Application Segments, not App Connector Groups
  • Insights Logs (ZIA) and Diagnostics (ZPA) provide transaction-level visibility for auditing and troubleshooting

Tags

Zero Trust Zscaler ZTNA ZIA ZPA ZCC SAML SCIM SSL Inspection Network Security VPN Replacement SASE Cloud Security