All posts

The simplest way to make Metabase Zscaler work like it should

Picture this: your team spins up a new Metabase dashboard, but half the company is stuck behind Zscaler’s gray wall of “Access Denied.” The data is right there, safe and well-governed, yet invisible to the people who need it. You could open firewall holes or whitelist random IPs, but that feels like borrowing trouble. There’s a smarter path. Metabase lets teams visualize everything from Postgres metrics to snowflake revenue charts without needing a PhD in SQL. Zscaler, on the other hand, acts a

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture this: your team spins up a new Metabase dashboard, but half the company is stuck behind Zscaler’s gray wall of “Access Denied.” The data is right there, safe and well-governed, yet invisible to the people who need it. You could open firewall holes or whitelist random IPs, but that feels like borrowing trouble. There’s a smarter path.

Metabase lets teams visualize everything from Postgres metrics to snowflake revenue charts without needing a PhD in SQL. Zscaler, on the other hand, acts as your secure perimeter in a perimeterless world, pushing zero trust down to the device level. Each tool is strong alone, but when your engineers integrate Metabase with Zscaler, dashboards stay tightly protected without strangling access.

At its core, the Metabase Zscaler connection is about identity and routing. You want users to reach Metabase through Zscaler’s private access layer, not the public internet. The workflow is simple. Zscaler authenticates the user with your identity provider, checks device posture, and then routes the approved session to your internal Metabase instance. Instead of juggling VPNs, firewalls, and manually updated IP lists, you get policy‑based zero‑trust access that just works.

To keep it smooth, align your role mappings between Zscaler and Metabase. Let Zscaler enforce device and identity, and let Metabase handle data-level permissions through its RBAC controls. Set short TTLs on session tokens and rotate service account secrets on a schedule. That keeps SOC 2 auditors happy and your risk surface tidy.

When it’s all working, the difference is obvious.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • No more VPN fatigue for analysts and developers.
  • Consistent SSO tracking and logging through Okta, Azure AD, or Google Workspace.
  • Faster onboarding for contractors or short-term data projects.
  • Cleaner audit trails showing who viewed which dashboard and when.
  • Reduced support load, since users hit URLs that “just open.”

Developers notice it first. Less friction to view staging dashboards. No Slack pings begging for “just one port open.” Approvals become policy, not paperwork. The result is real velocity: shorter loops between building, deploying, and seeing the numbers light up.

Platforms like hoop.dev turn those same zero‑trust rules into programmable guardrails. Instead of managing Zscaler and Metabase separately, hoop.dev applies identity-aware proxies that automatically enforce your policies at every endpoint. It’s the sort of invisible glue that modern infrastructure deserves.

How do I connect Metabase to Zscaler?
Point Zscaler Private Access to the internal Metabase host, attach the same identity provider used by your team, and verify the service connector is online. Once the route is active, users can reach Metabase securely through Zscaler using their company credentials.

Integrate them right, and your analytics stay private yet instantly available. No more juggling networks or exceptions, just data with guardrails.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts