Integrate Firewall with Zscaler
Zscaler is a cloud-native cybersecurity platform to securely connect users, devices, and applications, regardless of their location. Think of it as a security checkpoint in the cloud that all your organization's traffic can pass through for inspection and protection.
Sonatype's Repository Firewall integrates with Zscaler to block actively verified malware components from being directly downloaded from public repositories. This integration protects your organization from shadow downloads.
See Shadow Downloads Best Practices
Requirements
The configuration for blocking malware is automatic once the Repository Firewall and Zscaler integration is configured. A few additional settings need to be manually set on in Zscaler.
Enable SSL inspection on traffic
Set the URL filtering policy
Install Zscaler certificates on your developers' machines
Configuration
An administrator account is required to configure the Zscaler integration. The settings are found in the settings menu for Repository Firewall.

Credentials
Provide your Zscaler administrator account credicatials.
Hostname
The hostname is the url for your zscaler deployment.
API Keys
Generating a Zscaler API Key involves accessing the API Management section within the specific Zscaler Admin Portal you are using. The exact navigation path and some options might differ slightly depending on the Zscaler product. Consult the Zscaler Help Portal for the specific product you are using.
FAQ
The Zscaler integration is supported for the following formats for automatic Malware detection:
maven, npm, PyPi
Repository Firewall create custom User Define URL categories by component format. These endpoints are updated once daily.