Picture this: your team needs quick access to Redash dashboards, but corporate security insists everyone must go through Zscaler first. The result is often broken embeds, timed-out sessions, and engineers mumbling about “just exporting CSVs instead.” It doesn’t have to be that way. A proper Redash Zscaler setup keeps the data safe and your analytics running fast.
Redash is beloved for its simplicity. It connects to sources like PostgreSQL, BigQuery, or Snowflake, turning raw queries into living charts and alerts. Zscaler sits on the security side, acting as a cloud proxy that inspects traffic, enforces policy, and secures outbound access without traditional VPNs. When these two meet cleanly, you get red-hot visibility wrapped in enterprise-grade control.
The key is identity. Configure Zscaler to use your SSO provider—Okta, Azure AD, or another SAML/OIDC service—so that Redash inherits role-based access. Zscaler performs inline inspection and tunnel control, then forwards sessions only after it verifies user context. Redash can trust the identity claim and skip its own friction-heavy VPN whitelist. This all happens before a single dashboard is queried, making access both faster and safer.
In practice, the workflow looks like this:
- A developer hits the Redash URL.
- Zscaler intercepts and checks credentials with the identity provider.
- Session metadata (IP, group, device posture) is folded into the request.
- Redash reads those claims to enforce its own team or query-level permissions.
If Redash times out behind Zscaler, first check SSL inspection rules. Redash needs its database drivers untouched, so add exceptions where inspection breaks TLS negotiation. For RBAC mapping, ensure groups align between your identity provider and Redash’s users table. Rotate tokens regularly; both Zscaler’s trusted root and Redash’s API keys can linger longer than you expect.