Integrate a supported IAM system with Zero Trust Secure Access and grant the required permissions.
Zero Trust Secure Access supports the following IAM systems:
You must grant certain permissions within your IAM system to
enable Zero Trust Secure Access to monitor user sign-in attempts, access user data,
and perform
actions on user accounts. To enable user authentication for Private Access and Internet
Access,
you must configure SAML-based single sign-on (SSO) for your IAM system.
Note
|
Permission Requirements
Purpose
|
Permission
|
|
Data Upload
|
Policy Enforcement
|
|
Access user profiles and activity data for risk analysis
|
Yes
|
-
|
Take direct action on user accounts that violate policy rules (for example, Disable
User
Account, Force Sign Out, Force Password Reset)
|
Yes
|
Yes
|
Private Access authentication (SSO)
|
Yes
|
-
|
Internet Access authentication (SSO)
|
Yes
|
-
|