The provisioning key in Zscaler acts as the secure handshake between your endpoint clients and the Zscaler cloud. Without it, clients can't automatically enroll into the Zscaler service. With it, you can silently enroll thousands of devices at scale. This key is tied to your account, admin credentials, and provisioning settings, so it must be created, stored, and rotated with care.
To generate a provisioning key in Zscaler, log in to the Zscaler admin portal and navigate to the Enrollment section under Zscaler Client Connector or Zscaler Client Connector Portal Configuration. Here you define the enrollment settings: association with a specific location, group policy, tunnel mode, and authentication types. Once saved, the system produces a unique provisioning key—a long token that endpoints will consume during their first run. Distribute this key via your MDM, device image, or deployment script.
The provisioning key lifecycle is short by design. Zscaler forces an expiration timeline, often under a year, to reduce attack surfaces. Rotation means regenerating the key and updating deployment procedures. Immediate revocation is critical if you believe the key is compromised.