Skip to content

Phase 2

Pilot work proves the design with controlled users

Phase 2 implements the approved design in the Zscaler platform and enables a limited pilot group to validate authentication, forwarding, access, policy behavior, and user experience.

Current phase Phase 2
Milestone Pilot users onboarded
Aiden view Issues and owners
Template Initial Configuration

Initial configuration

The pilot is a technical validation, not a disguised production launch

SecureDynamics uses a limited group to test the expected flows and uncover issues while the blast radius is still small.

01

Configure foundations

Set up identity integration, provisioning, access policy foundations, Client Connector profiles, and forwarding behavior as scoped.

02

Onboard pilot users

Enable a small, known group to validate authentication, ZIA or ZPA access, policy behavior, and operational feedback.

03

Track findings

Aiden captures issues, examples, owners, impact, and next steps so validation moves toward rollout instead of becoming an endless test loop.

Canonical milestones

Milestone anchors the customer, partner, and ZTSM can reference consistently

These labels are used as section anchors so customer communications, Aiden reporting, and internal delivery notes stay aligned.

Phase 2

Pilot users onboarded

A limited set of users is enabled to validate authentication, forwarding, private access, inspection behavior, and the practical user experience before broader rollout.

Aiden AI project manager

Aiden keeps the project visible between working sessions

Aiden supports the SecureDynamics ZTSM by maintaining the delivery facts that are easy to lose: phase, milestone state, owners, dates, blockers, assumptions, and next steps.

Templated customer emails

Phase communications are linked directly from the delivery motion

Each thumbnail opens the live templated email view so partners, ZTSMs, and customers can see the customer-facing message for the relevant phase.

Next step

A good pilot keeps rollout boring

The point is to find surprises early, assign owners clearly, and carry only validated behavior into the production rollout.