Key Takeaways
- ZTNA deployments fall into three models: application-first, user-cohort, or hybrid - picking the wrong model is the most common cause of a stalled rollout.
- Identity provider integration must be treated as a gating workstream, not a parallel task, because it determines which users see which applications and which policies are enforced.
- Application onboarding scales linearly with application count - a small team handling this one-at-a-time cannot finish a 200-application rollout in reasonable time.
- Every application that does not fit ZTNA cleanly needs an explicit documented decision: continue on VPN with reduced scope, browser isolation, remediation, or sunset.
- Successful rollouts capture telemetry baselines before migration begins - VPN connection volume, latency, and failure rates - to measure progress objectively rather than anecdotally.
Why ZTNA Rollouts Stall
ZTNA platform selection is well-covered. ZTNA deployment at scale is not. The pattern is consistent: organizations buy a platform, run a successful pilot with 50 users and 5 applications, then spend nine months trying to extend it to 5,000 users and 200 applications, with the VPN still running in parallel and the executive sponsor losing patience.
The platform is rarely the problem. The problem is the deployment model, the application onboarding sequence, and the operational practices around identity, telemetry, and the long-tail applications that do not fit the ZTNA model cleanly.
The Three Deployment Models
ZTNA deployments fall into one of three models, sometimes blended. The model determines the timeline, the operational complexity, and the long-tail of applications that will or will not be addressed. Picking the wrong model is the most common cause of a stalled rollout. Picking deliberately, with knowledge of the tradeoffs, separates a 90-day rollout from a 9-month rollout.
Application-First Deployment
Onboard applications in cohorts (typically 5 to 15 at a time), with all users gaining ZTNA access to those applications simultaneously. The VPN continues to serve everything else. This is the fastest path to value for organizations with a clear hierarchy of business-critical applications and works well when 80% of user productivity sits behind 20% of applications.
Tradeoff: the long tail of applications stays on VPN longer.
User-Cohort Deployment
Migrate user cohorts (department, location, role) to ZTNA in waves, with each cohort gaining access to all in-scope applications at once. Each cohort's VPN access is decommissioned at cutover. This is the right model when the goal is VPN sunset and the application footprint is broad but consistent across user populations.
Tradeoff: cohort coordination, change management, and support readiness are heavier than in the application-first model.
Hybrid Cohort-And-Application
Combine the two: a critical-application cohort goes first across all users, then user cohorts roll over for the broader application set. This is the most common pattern in production deployments and balances quick wins with structured VPN sunset.
Tradeoff: requires more upfront planning and a clearer view of which applications are universally critical versus role-specific. Worth the planning cost for environments above 1,000 users.
How To Deploy ZTNA At Scale
The sequence below is the practitioner pattern for ZTNA deployments above 500 users. Smaller deployments compress some of these phases; larger deployments expand them. The order, however, holds: identity foundation, then telemetry baseline, then deployment model decision, then onboarding, then VPN sunset. Skipping any of the first three produces the stalled-rollout pattern.
Identity Provider Foundation
ZTNA is identity-driven. The identity provider integration determines which users see which applications, which device posture signals are evaluated, and which conditional access policies are enforced. This is the foundation, and it should be the cleanest piece of the deployment before any user touches ZTNA.
SAML or OIDC integration with the customer's IdP, MFA enforcement, and conditional access policies (location, device compliance, risk score) all need to be operational and tested. Treat this as a workstream that gates the others, not as a parallel task.
Telemetry Baseline And Application Inventory
Before the first user moves, capture the baseline. VPN connection volume by user cohort, application access patterns by user cohort, latency and failure rates, peak concurrency. Pair this with an application inventory that tags each application by criticality, user population, protocol (web, RDP, SSH, thick-client, file-share), and authentication method.
This inventory is the input to the deployment-model decision and the onboarding sequence; without it, every decision after this point is anecdotal.
Deployment Model Decision
Choose application-first, user-cohort, or hybrid based on the inventory and the business driver. VPN sunset urgency favors user-cohort or hybrid. Quick-wins-first favors application-first. Mixed environments above 1,000 users almost always favor hybrid.
The decision should be explicit, documented, and signed off by the executive sponsor. Changing the model mid-rollout is the second most common cause of a stalled deployment.
Application Onboarding At Scale
Application onboarding is the work that scales linearly with application count. A small team onboarding applications one at a time will not finish in a reasonable timeline. The practical pattern is to standardize onboarding into a templated workflow (connector deployment, IdP integration, policy assignment, validation) and parallelize across application owners or a dedicated rollout team.
Standard web applications onboard in hours; non-web protocols (RDP, SSH, thick-client) take longer and benefit from a separate workstream.
User Cohort Cutover With VPN Sunset
Each cohort cutover follows the same pattern: pre-cutover communication and training, ZTNA access enabled with VPN still available, validation period (typically 2 to 4 weeks), VPN access removed for the cohort. The VPN sunset is the part most often deferred and the part that most affects security posture; without sunset, ZTNA is an additional access path rather than a replacement.
The cutover sequence should be defined in the deployment plan, not improvised at each cohort.
Long-Tail Application Decisions
Some applications do not fit ZTNA cleanly. High-throughput data transfer, certain industrial protocols, applications with hardcoded IP authentication, or applications behind legacy authentication that cannot be modernized. For each, the decision is explicit: continue on VPN with reduced scope, move to browser isolation for unmanaged-device access, or remediate the application.
Leaving these decisions implicit produces the indefinite-VPN problem; making them explicit completes the rollout.
What A Production ZTNA Deployment Includes
The components below are what a complete ZTNA deployment delivers, regardless of platform. Each one is the deliverable that should exist by the end of the rollout, with operational ownership defined. Missing any of these means the deployment is functionally incomplete even if the platform is technically running.
Identity And Access Policies
SAML or OIDC integration with the customer IdP. MFA enforcement. Conditional access policies covering device posture, location, and risk signals. Group-based application access aligned to the customer directory, with policy lifecycle ownership defined.
Application Connectors
Connectors deployed in each environment hosting in-scope applications (data center, cloud, branch). High availability for production connectors. Health monitoring and alerting. Documented connector ownership and update cadence.
Device Posture Integration
Posture signals from the endpoint management platform (Microsoft Intune, Jamf, equivalent) integrated as ZTNA policy inputs. Compliance-state evaluation at session establishment. Session re-evaluation cadence defined. Non-compliant device handling policy in place.
Telemetry And Operational Visibility
Connection volume, latency, failure rate, and policy-denial telemetry feeding the operational monitoring stack. Pre-rollout baselines preserved for comparison. Alerting on anomalous patterns (sudden connection drops, policy-denial spikes, connector health issues).
User Onboarding Materials
Training documentation, video walkthroughs, and support runbooks for each user cohort. Pre-cutover communication templates. First-line support readiness verified before each cohort moves. Escalation path to the ZTNA platform vendor or co-managed service provider documented.
Long-Tail Application Disposition
Documented decision for each application that does not fit the ZTNA model: continue on VPN with reduced scope, browser isolation for unmanaged access, or remediation roadmap. No application is left in undefined disposition; this allows VPN sunset to be a real outcome rather than an aspiration.
Which deployment model fits your environment
The right deployment model depends on user count, application footprint, and the urgency of VPN sunset. The four scenarios below cover the most common patterns. Most environments above 1,000 users land in the hybrid model; smaller environments often succeed with a pure application-first or user-cohort approach.
Four operational practices that determine whether a ZTNA rollout finishes
ZTNA deployments succeed or stall based on operational practices more than platform choice. The four practices below are consistently present in deployments that finish on schedule and consistently absent in deployments that stall. None of them is platform-specific.
Identity foundation as a gating workstream
The identity provider integration determines which users see which applications, which device posture signals are evaluated, and which conditional access policies are enforced. Treating it as a parallel task that runs alongside everything else produces a deployment where the foundation is still moving when the user-facing work needs to be solid.
How successful deployments handle this: Identity work is scoped, executed, and validated before user cohort planning begins in detail. SAML or OIDC integration, MFA enforcement, and conditional access policies are operational and tested. Application onboarding can proceed in parallel after identity is solid; the foundation is not where parallelism saves time.
Pre-rollout telemetry baseline
Most stalled rollouts are unable to demonstrate progress because they have no baseline to compare against. Capturing VPN connection volume, application access patterns, latency, and failure rates before the first cohort moves enables every subsequent conversation about the rollout's success.
What the baseline enables: Cohort-by-cohort comparison of VPN traffic reduction, ZTNA connection volume growth, and aggregate access pattern changes. Anomaly detection during cutover. Defensible reporting to the executive sponsor, which maintains sponsorship through the long middle phase of the rollout.
Templated application onboarding
A small team onboarding applications one-at-a-time cannot finish a 200-application rollout in a reasonable timeline. The practical pattern is to standardize onboarding into a templated workflow (connector deployment, IdP integration, policy assignment, validation) and parallelize execution across application owners or a dedicated rollout team.
How the template is structured: Template covers connector type and placement, IdP integration configuration, policy assignment by user group, validation checklist, and cutover communication. Standard web applications onboard in hours under the template; non-web protocols take longer and benefit from a separate, parallel workstream with its own template.
Explicit long-tail application disposition
Some applications do not fit the ZTNA model. The successful pattern is to document a decision for each: continue on VPN with reduced scope, move to browser isolation for unmanaged-device access, or remediate the application. The unsuccessful pattern is to leave these decisions implicit, which produces the indefinite-VPN outcome.
What the disposition document looks like: For each application not migrated to ZTNA, the document records the reason, the chosen alternative access path, the operational owner, and the review date. Applications scheduled for sunset or replacement are noted with target dates. This document makes VPN sunset an executable outcome rather than an aspiration; without it, the long tail wins.
Who This Guide Is For
This guide is for organizations that have already chosen a ZTNA platform (or are about to) and need to deploy it at scale. Platform comparison content is covered separately; this is the deployment reference.
Specifically designed for IT and security leaders accountable for ZTNA rollouts above 500 users, network and security architects designing the deployment plan and selecting the deployment model, operations teams owning the application onboarding workstream and post-rollout operational handoff, project sponsors who need to understand why some deployments take 90 days and others take 9 months, and organizations with active VPN sunset goals where ZTNA is the planned replacement.