In the ZDTE material under Advanced Access Control Services, Tenant Restrictions (often discussed with “personal vs. corporate” SaaS use) are described as a way to ensure users can only authenticate to sanctioned organization tenants for apps like Microsoft 365, Google Workspace, or other major SaaS platforms.
Zscaler does this by acting as an inline Zero Trust proxy and modifying the authentication flow, not by bluntly blocking all external SaaS access. The docs explain that, for supported SaaS applications, Zscaler injects specific identity or tenant identifiers (for example, the allowed tenant ID or corresponding claim) into the HTTP(S) requests during sign-in. These injected headers or parameters signal to the SaaS provider which tenant is permitted so that logins to personal or unsanctioned tenants can be transparently blocked or challenged while corporate tenant access is allowed.
Because this enforcement is done at the HTTP/S layer using header/parameter insertion tied to identity and policy, users retain seamless access to approved corporate tenants while attempts to use personal or shadow-IT tenants are controlled according to policy—exactly what Option C describes.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit