The following describes how to protect SaaS applications.
You can also refer the video that discusses protecting a SaaS service with Allow Lists.
To protect SaaS applications
If SCIM (System for Cross-domain Identity Management) is enabled, assign the users to your Tunnel Policy.
If SCIM Is not enabled, admins should instruct end users to log into Cloud Secure Edge and register their devices. When done, the administrator can assign the end users to the policy.
To validate that your SaaS application is protected, navigate to Private Access > Service Tunnels in the Cloud Secure Edge Command Center. Select the Service Tunnel on which you configured the SaaS applications. Review the configuration under Public Include Info and verify that your SaaS applications are correctly entered into the Apps to Include field.