Zscaler Beta

Zscaler Beta

List view
Quick Start
User Guide
Policies & GuardRails
Witness Anywhere: Remote Device Security
Witness Attack
Administrator Guide
 

Zscaler Beta Internet Access Configuration

💡
Network device integrations have been updated in WitnessAI v2.0. Devices configured for WitnessAI v1.5 will need a minor update to support v2.0. Some new features will not activate until your devices are updated.
Existing v1.5 network devices will continue to work without interruption in v2.0.
See the network integration guides in the Integrations menu for details.
Have questions? Our support team will be happy to assist.
💡
Zscaler integration Note: WitnessAI requires a service account for administering Zscaler. For example, svc_witnessai_zia. Instructions are in the Configure Service Account section below.
Zscaler integration Note: WitnessAI requires a service account for administering Zscaler. For example, svc_witnessai_zia. Instructions are in the Configure Service Account section below.
The service account and password must be provided to WitnessAI during onboarding.
This service account  is used by WitnessAI to create and manage the URL category WitnessFwdUrls, which contains domains associated with AI websites.
Note: This Url category is managed exclusively by WitnessAI and should not be modified by administrators.

Configure Service account

Create a new Role
  1. Navigate to Administration → Authentication → Administration Controls → Role Management
    1. notion image
  1. At the top, click “Add Administrator Role”
    1. notion image
  1. Enter the role name as Beta-API-Scope
    1. notion image
  1. Navigate to Policy & Components (1), click on URL Categories (2) followed by Custom (3).
    1. notion image
  1. Configure the Custom URL Category
    1. Set Zscaler Defined URL Category Management to None.
    2. Set Override Existing Categories to None.
    3. Set Custom URL Management to full.
    4. If there are any new categories, set them to either None or View Only.
    5. Click Save.
      1. notion image
 
Create a new Admin account
  1. Navigate to Administration → Authentication → Administration Controls → Administrator Management
    1. notion image
  1. At the top, click “Add Administrator”
    1. notion image
  1. Enter the role name as Beta-API-Admin (1).
  1. Assign the Beta-API-Scope role created above (2).
  1. Assign a password.
  1. Click Save (3).
    1. notion image
  1. Provide the name of the account and password to the WitnessAI account team.
 

Cloud Service API Key

Create a new API Key
  1. Navigate to Administration → Authentication → Authentication Configuration → Cloud Service API Security
    1. notion image
 
  1. Click Add API Key, if you haven’t created one already. If there is an API Key created (1), copy the Key and the base URL (2) and provide it to your WitnessAI account team.
    1. notion image
 
 

Proxy Setup

Install WitnessAI Provided Root Certificate

  1. Click Administration → Root Certificates.
notion image
 
2. Click Add Root Certificate.
  1. Name: [WitnessRootCA]
  1. Type: [Proxy Chaining].
    1. WitnessAI will provide the Root Certificate for the administrator to upload – once uploaded, click Save.
      • Note: WitnessAI can support a customer provided Root Certificate. However, it is recommended that administrators create a unique Root Certificate specific for the WitnessAI platform and provide it to the account team.
notion image
 
3. Select Administration → Proxies & Gateways.
notion image
 
4. Select Add Proxy and update the Proxy Name to [WitnessAI_NetworkConnector].
  1. For Proxy’s Root Certificate, select the Root Certificate created in Step 2.
  1. FQDN → connect.[tenantID].[region].witness.ai
  1. Port → 4128
  1. Enable the Insert-X-Authenticated-User switch.
  1. Enable the Base64 Encoding for X-Authenticated-User value switch.
notion image
 
5. Go to Proxy Gateways
  1. Click Add Gateway for Proxies.
  1. Gateway Name: [WitnessConnect].
  1. Fail Close: [Disable].
  1. Primary Proxy: [WitnessAI_NetworkConnector].
notion image
 

SSL Inspection Configuration

1. Navigate to Policy → SSL Inspection and click on Add SSL Inspection Rule.
notion image
 
2. Input the following information
  • Rule Order: Place it above the Generic inspection/bypass rules.
  • Rule Name: [WitnessAI-Inspection Rule].
  • Rule Status: [Enabled].
  • URL Categories: [WitnessFwdUrls].
notion image
 
  • Action: Inspect
  • Enable HTTP/2: Yes
  • Select: Save
notion image
 

Network Connector Integration

1. Select Policy Forwarding Control.
notion image
 
2. Select Add Forwarding Rule.
  1. Rule Order – Make this as high as possible.
  1. Rule Name: [WitnessForwarding].
  1. Rule Status: [Enabled].
  1. Forwarding Method: [Proxy Chaining]
  1. General: [Define which user population will be inspected for AI].
  1. Forward to Proxy Gateway: [WitnessAI_NetworkConnector].
    1. notion image
g. Destination URL Category → WitnessFwdUrls
h. Select: Save
notion image