This is the story many teams face when trying to get Kerberos to work behind Zscaler’s cloud security platform. Kerberos uses tickets. Zscaler uses inspection. The two can clash unless you understand how to configure them to trust each other.
Kerberos Zscaler integration starts with knowing that Kerberos is sensitive to packet changes. Zscaler’s SSL inspection modifies traffic. If your client or application expects untouched Kerberos tickets, inspection can break authentication. That is why bypass rules matter. In Zscaler, set policy to skip inspection for Kerberos traffic from your domain controllers and key servers. Confirm the ports and protocols: Kerberos runs on TCP and UDP port 88, and can use port 464 for password changes.
Check DNS resolution. Kerberos depends on precise hostnames in SPNs (Service Principal Names). Zscaler may reroute or proxy requests, creating mismatches. Use Zscaler’s PAC files or forwarding rules to keep requests direct when they involve authentication. Avoid hostname tampering or unexpected IP rewriting in the Kerberos flow.