Your Zscaler deployment is now in Phase 2 – Initial Configuration.
Phase 2 is where the approved design from Phase 1 is implemented in the Zscaler platform and validated using a limited set of pilot users. The objective is to ensure the environment behaves exactly as expected before broader rollout begins.
Best regards, TBD |TBD
What Happens During Phase 2
During Initial Configuration, SecureDynamics focuses on building and validating the core components of your deployment:
Identity & Provisioning Configuration
Integration of your identity provider (for example, SAML and SCIM), confirmation of group synchronization, and validation of authentication flows for both ZIA and ZPA.
ZPA Foundation & Application Access (If In Scope)
Configuration required to onboard private applications, including identity alignment, access policy foundations, and App Connector readiness.
App Connector Deployment & Validation (If In Scope)
Deployment of App Connectors in your environment, confirmation of connectivity to the Zscaler cloud, and validation of required DNS and network prerequisites.
Client Connector & Forwarding Configuration
Baseline Client Connector profiles are configured to enable, where applicable, ZIA access/inspection and/or ZPA access—without broadly impacting users.
Limited Pilot User Testing
A small set of pilot users is enabled to validate:
Authentication and provisioning behavior
Internet and SaaS access through ZIA (if applicable)
Private application access through ZPA (if applicable)
Policy behavior and user experience
These pilot users are used strictly for technical validation, not full production rollout.
Baseline Policy & Inspection Readiness
Initial policy configuration and inspection behavior are validated so that Phase 3 rollout can proceed predictably.
What to Expect During This Phase
Configuration and validation work occurring primarily in the background
Occasional targeted requests for input from your team
Pilot users experiencing early access while the environment is verified
Any issues identified during pilot testing are addressed before expanding access.
What We May Need From You
To keep Phase 2 moving smoothly, we may request:
Confirmation of pilot users and associated identity groups
App Connector hosting details and network prerequisites
Change window considerations or operational constraints
What Comes Next
Once Phase 2 validation is complete, we’ll move into Phase 3 – Traffic Rollout, where access is expanded in a controlled, phased manner using the validated configuration.
Important: During active deployment projects, SecureDynamics does not provide a formal SLA for support tickets. However, our Zero Trust Success Managers (ZTSMs) will make every reasonable effort to respond quickly and, if needed, coordinate a short working session to assist.
Helpful Resources
Zscaler Deployment Advisor GPT – your interactive GPT guide for deployment sequencing, readiness validation, and early configuration insights.
If you want deeper guidance on any deployment topic—such as connector design, policy structure, or advanced configuration—enter #zboost followed by your most questions directly in our custom GPT.
For example:
#zboost how do I configure SCIM for ZPA with Entra ID?
ZBoost instantly connects you to validated technical content, deployment playbooks, and design templates to help you go even further.