Skip to content

Commit 9081d44

Browse files
authored
Merge pull request #236709 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST, 05/03
2 parents 59cdc7e + d592abf commit 9081d44

File tree

82 files changed

+1269
-1230
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+1269
-1230
lines changed

articles/active-directory/develop/single-sign-on-macos-ios.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 11/23/2022
12+
ms.date: 05/03/2023
1313
ms.author: henrymbugua
1414
ms.reviewer:
1515
ms.custom: aaddev, engagement-fy23
@@ -25,9 +25,7 @@ This type of SSO works between multiple apps distributed by the same Apple Devel
2525

2626
- [SSO through Authentication broker](#sso-through-authentication-broker-on-ios)
2727

28-
The SSO through authentication broker isn't available on macOS.
29-
30-
Microsoft provides apps called brokers, that enable SSO between applications from different vendors as long as the mobile device is registered with Azure Active Directory (Azure AD). This type of SSO requires a broker application be installed on the user's device.
28+
Microsoft provides apps called brokers that enable SSO between applications from different vendors as long as the mobile device is registered with Azure Active Directory (Azure AD). This type of SSO requires a broker application be installed on the user's device.
3129

3230
- **SSO between MSAL and Safari**
3331

@@ -39,7 +37,7 @@ This type of SSO is currently not available on macOS. MSAL on macOS only support
3937

4038
- **Silent SSO between ADAL and MSAL macOS/iOS apps**
4139

42-
MSAL Objective-C supports migration and SSO with ADAL Objective-C-based apps. The apps must be distributed by the same Apple Developer.
40+
MSAL Objective-C support migration and SSO with ADAL Objective-C-based apps. The apps must be distributed by the same Apple Developer.
4341

4442
See [SSO between ADAL and MSAL apps on macOS and iOS](sso-between-adal-msal-apps-macos-ios.md) for instructions for cross-app SSO between ADAL and MSAL-based apps.
4543

Lines changed: 62 additions & 98 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Secure hybrid access with Azure AD and Cloudflare
2+
title: Configure Cloudflare with Azure Active Directory for secure hybrid access
33
description: In this tutorial, learn how to integrate Cloudflare with Azure AD for secure hybrid access
44
services: active-directory
55
author: gargi-sinha
@@ -8,184 +8,148 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 6/27/2022
11+
ms.date: 05/02/2023
1212
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
ms.custom: not-enterprise-apps
1515
---
1616

1717
# Tutorial: Configure Cloudflare with Azure Active Directory for secure hybrid access
1818

19-
In this tutorial, learn how to integrate Azure Active Directory
20-
(Azure AD) with Cloudflare Zero Trust. Using this solution, you can build rules based on user identity and group membership. Users can authenticate with their Azure AD credentials and connect to Zero Trust protected applications.
19+
In this tutorial, learn to integrate Azure Active Directory (Azure AD) with Cloudflare Zero Trust. Build rules based on user identity and group membership. Users authenticate with Azure AD credentials and connect to Zero Trust protected applications.
2120

2221
## Prerequisites
2322

24-
To get started, you need:
25-
26-
- An Azure AD subscription
27-
28-
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
29-
30-
- An Azure AD tenant linked to your Azure AD subscription
31-
32-
- See, [Quickstart: Create a new tenant in Azure Active Directory](../fundamentals/active-directory-access-create-new-tenant.md).
33-
34-
- A Cloudflare Zero Trust account
35-
36-
- If you don't have one, go to [Get started with Cloudflare's Zero Trust
37-
platform](https://dash.cloudflare.com/sign-up/teams)
23+
* An Azure AD subscription
24+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
25+
* An Azure AD tenant linked to the Azure AD subscription
26+
* See, [Quickstart: Create a new tenant in Azure AD](../fundamentals/active-directory-access-create-new-tenant.md)
27+
* A Cloudflare Zero Trust account
28+
* If you don't have one, go to [Get started with Cloudflare's Zero Trust platform](https://dash.cloudflare.com/sign-up/teams)
3829

3930
## Integrate organization identity providers with Cloudflare Access
4031

41-
Cloudflare Zero Trust Access helps enforce default-deny, Zero Trust
42-
rules that limit access to corporate applications, private IP spaces,
43-
and hostnames. This feature connects users faster and safer than a virtual private network (VPN).
32+
Cloudflare Zero Trust Access helps enforce default-deny, Zero Trust rules that limit access to corporate applications, private IP spaces, and hostnames. This feature connects users faster and safer than a virtual private network (VPN). Organizations can use multiple identity providers (IdPs), reducing friction when working with partners or contractors.
4433

45-
Organizations can use multiple Identity Providers (IdPs) simultaneously, reducing friction when working with partners
46-
or contractors.
34+
To add an IdP as a sign-in method, sign in to Cloudflare on the [Cloudflare sign in page](https://dash.teams.cloudflare.com/) and Azure AD.
4735

48-
To add an IdP as a sign-in method, configure [Cloudflare Zero Trust
49-
dashboard](https://dash.teams.cloudflare.com/) and Azure
50-
AD.
36+
The following architecture diagram shows the integration.
5137

52-
The following architecture diagram shows the implementation.
53-
54-
![Screenshot shows the architecture diagram of Cloudflare and Azure AD integration](./media/cloudflare-azure-ad-integration/cloudflare-architecture-diagram.png)
38+
![Diagram of the Cloudflare and Azure AD integration architecture.](./media/cloudflare-azure-ad-integration/cloudflare-architecture-diagram.png)
5539

5640
## Integrate a Cloudflare Zero Trust account with Azure AD
5741

58-
To integrate Cloudflare Zero Trust account with an instance of Azure AD:
59-
60-
1. On the [Cloudflare Zero Trust
61-
dashboard](https://dash.teams.cloudflare.com/),
62-
navigate to **Settings > Authentication**.
42+
Integrate Cloudflare Zero Trust account with an instance of Azure AD.
6343

64-
2. For **Login methods**, select **Add new**.
44+
1. Sign in to the Cloudflare Zero Trust dashboard on the [Cloudflare sign in page](https://dash.teams.cloudflare.com/).
45+
2. Navigate to **Settings**.
46+
3. Select **Authentication**.
47+
4. For **Login methods**, select **Add new**.
6548

66-
![Screenshot shows adding new login methods](./media/cloudflare-azure-ad-integration/login-methods.png)
49+
![Screenshot of the Login methods option on Authentication.](./media/cloudflare-azure-ad-integration/login-methods.png)
6750

68-
3. Under **Select an identity provider**, select **Azure AD.**
51+
5. Under **Select an identity provider**, select **Azure AD.**
6952

70-
![Screenshot shows selecting a new identity provider](./media/cloudflare-azure-ad-integration/idp-azure-ad.png)
53+
![Screenshot of the Azure AD option under Select an identity provider.](./media/cloudflare-azure-ad-integration/idp-azure-ad.png)
7154

72-
4. The **Add Azure ID** dialog appears. Enter credentials from your Azure AD instance and make necessary selections.
55+
6. The **Add Azure ID** dialog appears.
56+
7. Enter Azure AD instance credentials and make needed selections.
7357

74-
![Screenshot shows making selections to Azure AD dialog box](./media/cloudflare-azure-ad-integration/add-azure-ad-as-idp.png)
58+
![Screenshot of options and selections for Add Azure AD.](./media/cloudflare-azure-ad-integration/add-azure-ad-as-idp.png)
7559

76-
5. Select **Save**.
60+
8. Select **Save**.
7761

7862
## Register Cloudflare with Azure AD
7963

8064
Use the instructions in the following three sections to register Cloudflare with Azure AD.
8165

8266
1. Sign in to the [Azure portal](https://portal.azure.com/).
83-
8467
2. Under **Azure Services**, select **Azure Active Directory**.
85-
8668
3. In the left menu, under **Manage**, select **App registrations**.
69+
4. Select the **+ New registration** tab.
70+
5. Enter an application **Name**
71+
6. Enter a team name with **callback** at the end of the path. For example, `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback`
72+
7. Select **Register**.
8773

88-
4. Select the **+ New registration tab**.
89-
90-
5. Name your application and enter your [team
91-
domain](https://developers.cloudflare.com/cloudflare-one/glossary#team-domain), with **callback** at the end of the path: /cdn-cgi/access/callback.
92-
For example, `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback`
93-
94-
6. Select **Register**.
74+
See the [team domain](https://developers.cloudflare.com/cloudflare-one/glossary#team-domain) definition in the Cloudflare Glossary.
9575

96-
![Screenshot shows registering an application](./media/cloudflare-azure-ad-integration/register-application.png)
76+
![Screenshot of options and selections for Register an application.](./media/cloudflare-azure-ad-integration/register-application.png)
9777

9878
### Certificates & secrets
9979

100-
1. On the **Cloudflare Access** screen, under **Essentials**, copy and save the Application (client) ID and the Directory (tenant) ID.
80+
1. On the **Cloudflare Access** screen, under **Essentials**, copy and save the Application (Client) ID and the Directory (Tenant) ID.
10181

102-
[ ![Screenshot shows cloudflare access screen](./media/cloudflare-azure-ad-integration/cloudflare-access.png) ](./media/cloudflare-azure-ad-integration/cloudflare-access.png#lightbox)
82+
[![Screenshot of the Cloudflare Access screen.](./media/cloudflare-azure-ad-integration/cloudflare-access.png)](./media/cloudflare-azure-ad-integration/cloudflare-access.png#lightbox)
10383

10484

105-
2. In the left menu, under **Manage**, select **Certificates &
106-
secrets**.
10785

108-
![Screenshot shows Azure AD certificates and secrets screen](./media/cloudflare-azure-ad-integration/add-client-secret.png)
10986

110-
3. Under **Client secrets**, select **+ New client secret**.
87+
2. In the left menu, under **Manage**, select **Certificates & secrets**.
11188

112-
4. In **Description**, name the client secret.
89+
![Screenshot of the certificates and secrets screen.](./media/cloudflare-azure-ad-integration/add-client-secret.png)
11390

91+
3. Under **Client secrets**, select **+ New client secret**.
92+
4. In **Description**, enter the Client Secret.
11493
5. Under **Expires**, select an expiration.
115-
11694
6. Select **Add**.
95+
7. Under **Client secrets**, from the **Value** field, copy the value. Consider the value an application password. The example value appears, Azure values appear in the Cloudflare Access configuration.
11796

118-
7. Under **Client secrets**, from the **Value** field, copy the value. Consider the value an application password. This example's value is visible, Azure values appear in the Cloudflare Access configuration.
119-
120-
![Screenshot shows cloudflare access configuration for Azure AD](./media/cloudflare-azure-ad-integration/cloudflare-access-configuration.png)
97+
![Screenshot of Client secrets input.](./media/cloudflare-azure-ad-integration/cloudflare-access-configuration.png)
12198

12299
### Permissions
123100

124101
1. In the left menu, select **API permissions**.
125-
126-
2. Select **+** **Add a permission**.
127-
102+
2. Select **+ Add a permission**.
128103
3. Under **Select an API**, select **Microsoft Graph**.
129104

130-
![Screenshot shows Azure AD API permissions using MS Graph](./media/cloudflare-azure-ad-integration/microsoft-graph.png)
105+
![Screenshot of the Microsoft Graph option under Request API permissions.](./media/cloudflare-azure-ad-integration/microsoft-graph.png)
131106

132107
4. Select **Delegated permissions** for the following permissions:
133108

134-
- `Email`
135-
136-
- `openid`
137-
138-
- `profile`
109+
* Email
110+
* openid
111+
* profile
112+
* offline_access
113+
* user.read
114+
* directory.read.all
115+
* group.read.all
139116

140-
- `offline_access`
141117

142-
- `user.read`
118+
5. Under **Manage**, select **+ Add permissions**.
143119

144-
- `directory.read.all`
120+
[![Screenshot options and selections for Request API permissions.](./media/cloudflare-azure-ad-integration/request-api-permissions.png)](./media/cloudflare-azure-ad-integration/request-api-permissions.png#lightbox)
145121

146-
- `group.read.all`
147-
148-
5. Under **Manage**, select **+** **Add permissions**.
149-
150-
[ ![Screenshot shows Azure AD request API permissions screen](./media/cloudflare-azure-ad-integration/request-api-permissions.png) ](./media/cloudflare-azure-ad-integration/request-api-permissions.png#lightbox)
151122

152123

153124
6. Select **Grant Admin Consent for ...**.
154125

155-
[ ![Screenshot shows configured API permissions with granting admin consent](./media/cloudflare-azure-ad-integration/grant-admin-consent.png) ](./media/cloudflare-azure-ad-integration/grant-admin-consent.png#lightbox)
126+
[![Screenshot of configured permissions under API permissions.](./media/cloudflare-azure-ad-integration/grant-admin-consent.png)](./media/cloudflare-azure-ad-integration/grant-admin-consent.png#lightbox)
156127

157128

158-
7. On the [Cloudflare Zero Trust dashboard](https://dash.teams.cloudflare.com/),
159-
navigate to **Settings> Authentication**.
160129

130+
7. On the Cloudflare Zero Trust dashboard, navigate to **Settings > Authentication**.
161131
8. Under **Login methods**, select **Add new**.
162-
163132
9. Select **Azure AD**.
164-
165-
10. Enter the Application ID, Application secret, and Directory ID values.
166-
167-
>[!NOTE]
168-
>For Azure AD groups, in **Edit your Azure AD identity provider**, for **Support Groups** select **On**.
169-
133+
10. Enter values for **Application ID**, **Application Secret**, and **Directory ID**.
170134
11. Select **Save**.
171135

172-
## Test the integration
136+
>[!NOTE]
137+
>For Azure AD groups, in **Edit your Azure AD identity provider**, for **Support Groups** select **On**.
173138
174-
1. To test the integration on the Cloudflare Zero Trust dashboard,
175-
navigate to **Settings** > **Authentication**.
139+
## Test the integration
176140

141+
1. On the Cloudflare Zero Trust dashboard, navigate to **Settings** > **Authentication**.
177142
2. Under **Login methods**, for Azure AD select **Test**.
178143

179-
![Screenshot shows Azure AD as the login method for test](./media/cloudflare-azure-ad-integration/login-methods-test.png)
144+
![Screenshot of login methods.](./media/cloudflare-azure-ad-integration/login-methods-test.png)
180145

181146
3. Enter Azure AD credentials.
182-
183147
4. The **Your connection works** message appears.
184148

185-
![Screenshot shows Your connection works screen](./media/cloudflare-azure-ad-integration/connection-success-screen.png)
149+
![Screenshot of the Your connection works message.](./media/cloudflare-azure-ad-integration/connection-success-screen.png)
186150

187-
## Next steps
188151

189-
- [Integrate single sign-on (SSO) with Cloudflare](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/)
152+
## Next steps
190153

191-
- [Cloudflare integration with Azure AD B2C](../../active-directory-b2c/partner-cloudflare.md)
154+
- Go to developer.cloudflare.com for [Integrate SSO](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/)
155+
- [Tutorial: Configure Cloudflare Web Application Firewall with Azure AD B2C](../../active-directory-b2c/partner-cloudflare.md)

0 commit comments

Comments
 (0)