You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/single-sign-on-macos-ios.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 11/23/2022
12
+
ms.date: 05/03/2023
13
13
ms.author: henrymbugua
14
14
ms.reviewer:
15
15
ms.custom: aaddev, engagement-fy23
@@ -25,9 +25,7 @@ This type of SSO works between multiple apps distributed by the same Apple Devel
25
25
26
26
-[SSO through Authentication broker](#sso-through-authentication-broker-on-ios)
27
27
28
-
The SSO through authentication broker isn't available on macOS.
29
-
30
-
Microsoft provides apps called brokers, that enable SSO between applications from different vendors as long as the mobile device is registered with Azure Active Directory (Azure AD). This type of SSO requires a broker application be installed on the user's device.
28
+
Microsoft provides apps called brokers that enable SSO between applications from different vendors as long as the mobile device is registered with Azure Active Directory (Azure AD). This type of SSO requires a broker application be installed on the user's device.
31
29
32
30
-**SSO between MSAL and Safari**
33
31
@@ -39,7 +37,7 @@ This type of SSO is currently not available on macOS. MSAL on macOS only support
39
37
40
38
-**Silent SSO between ADAL and MSAL macOS/iOS apps**
41
39
42
-
MSAL Objective-C supports migration and SSO with ADAL Objective-C-based apps. The apps must be distributed by the same Apple Developer.
40
+
MSAL Objective-C support migration and SSO with ADAL Objective-C-based apps. The apps must be distributed by the same Apple Developer.
43
41
44
42
See [SSO between ADAL and MSAL apps on macOS and iOS](sso-between-adal-msal-apps-macos-ios.md) for instructions for cross-app SSO between ADAL and MSAL-based apps.
title: Secure hybrid access with Azure AD and Cloudflare
2
+
title: Configure Cloudflare with Azure Active Directory for secure hybrid access
3
3
description: In this tutorial, learn how to integrate Cloudflare with Azure AD for secure hybrid access
4
4
services: active-directory
5
5
author: gargi-sinha
@@ -8,184 +8,148 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 6/27/2022
11
+
ms.date: 05/02/2023
12
12
ms.author: gasinh
13
13
ms.collection: M365-identity-device-management
14
14
ms.custom: not-enterprise-apps
15
15
---
16
16
17
17
# Tutorial: Configure Cloudflare with Azure Active Directory for secure hybrid access
18
18
19
-
In this tutorial, learn how to integrate Azure Active Directory
20
-
(Azure AD) with Cloudflare Zero Trust. Using this solution, you can build rules based on user identity and group membership. Users can authenticate with their Azure AD credentials and connect to Zero Trust protected applications.
19
+
In this tutorial, learn to integrate Azure Active Directory (Azure AD) with Cloudflare Zero Trust. Build rules based on user identity and group membership. Users authenticate with Azure AD credentials and connect to Zero Trust protected applications.
21
20
22
21
## Prerequisites
23
22
24
-
To get started, you need:
25
-
26
-
- An Azure AD subscription
27
-
28
-
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
29
-
30
-
- An Azure AD tenant linked to your Azure AD subscription
31
-
32
-
- See, [Quickstart: Create a new tenant in Azure Active Directory](../fundamentals/active-directory-access-create-new-tenant.md).
33
-
34
-
- A Cloudflare Zero Trust account
35
-
36
-
- If you don't have one, go to [Get started with Cloudflare's Zero Trust
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
25
+
* An Azure AD tenant linked to the Azure AD subscription
26
+
* See, [Quickstart: Create a new tenant in Azure AD](../fundamentals/active-directory-access-create-new-tenant.md)
27
+
* A Cloudflare Zero Trust account
28
+
* If you don't have one, go to [Get started with Cloudflare's Zero Trust platform](https://dash.cloudflare.com/sign-up/teams)
38
29
39
30
## Integrate organization identity providers with Cloudflare Access
40
31
41
-
Cloudflare Zero Trust Access helps enforce default-deny, Zero Trust
42
-
rules that limit access to corporate applications, private IP spaces,
43
-
and hostnames. This feature connects users faster and safer than a virtual private network (VPN).
32
+
Cloudflare Zero Trust Access helps enforce default-deny, Zero Trust rules that limit access to corporate applications, private IP spaces, and hostnames. This feature connects users faster and safer than a virtual private network (VPN). Organizations can use multiple identity providers (IdPs), reducing friction when working with partners or contractors.
44
33
45
-
Organizations can use multiple Identity Providers (IdPs) simultaneously, reducing friction when working with partners
46
-
or contractors.
34
+
To add an IdP as a sign-in method, sign in to Cloudflare on the [Cloudflare sign in page](https://dash.teams.cloudflare.com/) and Azure AD.
47
35
48
-
To add an IdP as a sign-in method, configure [Cloudflare Zero Trust
49
-
dashboard](https://dash.teams.cloudflare.com/) and Azure
50
-
AD.
36
+
The following architecture diagram shows the integration.
51
37
52
-
The following architecture diagram shows the implementation.
53
-
54
-

38
+

55
39
56
40
## Integrate a Cloudflare Zero Trust account with Azure AD
57
41
58
-
To integrate Cloudflare Zero Trust account with an instance of Azure AD:
59
-
60
-
1. On the [Cloudflare Zero Trust
61
-
dashboard](https://dash.teams.cloudflare.com/),
62
-
navigate to **Settings > Authentication**.
42
+
Integrate Cloudflare Zero Trust account with an instance of Azure AD.
63
43
64
-
2. For **Login methods**, select **Add new**.
44
+
1. Sign in to the Cloudflare Zero Trust dashboard on the [Cloudflare sign in page](https://dash.teams.cloudflare.com/).
45
+
2. Navigate to **Settings**.
46
+
3. Select **Authentication**.
47
+
4. For **Login methods**, select **Add new**.
65
48
66
-

49
+

67
50
68
-
3. Under **Select an identity provider**, select **Azure AD.**
51
+
5. Under **Select an identity provider**, select **Azure AD.**
69
52
70
-

53
+

71
54
72
-
4. The **Add Azure ID** dialog appears. Enter credentials from your Azure AD instance and make necessary selections.
55
+
6. The **Add Azure ID** dialog appears.
56
+
7. Enter Azure AD instance credentials and make needed selections.
73
57
74
-

58
+

75
59
76
-
5. Select **Save**.
60
+
8. Select **Save**.
77
61
78
62
## Register Cloudflare with Azure AD
79
63
80
64
Use the instructions in the following three sections to register Cloudflare with Azure AD.
81
65
82
66
1. Sign in to the [Azure portal](https://portal.azure.com/).
83
-
84
67
2. Under **Azure Services**, select **Azure Active Directory**.
85
-
86
68
3. In the left menu, under **Manage**, select **App registrations**.
69
+
4. Select the **+ New registration** tab.
70
+
5. Enter an application **Name**
71
+
6. Enter a team name with **callback** at the end of the path. For example, `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback`
72
+
7. Select **Register**.
87
73
88
-
4. Select the **+ New registration tab**.
89
-
90
-
5. Name your application and enter your [team
91
-
domain](https://developers.cloudflare.com/cloudflare-one/glossary#team-domain), with **callback** at the end of the path: /cdn-cgi/access/callback.
92
-
For example, `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback`
93
-
94
-
6. Select **Register**.
74
+
See the [team domain](https://developers.cloudflare.com/cloudflare-one/glossary#team-domain) definition in the Cloudflare Glossary.
95
75
96
-

76
+

97
77
98
78
### Certificates & secrets
99
79
100
-
1. On the **Cloudflare Access** screen, under **Essentials**, copy and save the Application (client) ID and the Directory (tenant) ID.
80
+
1. On the **Cloudflare Access** screen, under **Essentials**, copy and save the Application (Client) ID and the Directory (Tenant) ID.
[](./media/cloudflare-azure-ad-integration/cloudflare-access.png#lightbox)
103
83
104
84
105
-
2. In the left menu, under **Manage**, select **Certificates &
106
-
secrets**.
107
85
108
-

109
86
110
-
3. Under **Client secrets**, select **+ New client secret**.
87
+
2. In the left menu, under **Manage**, select **Certificates & secrets**.
111
88
112
-
4. In **Description**, name the client secret.
89
+

113
90
91
+
3. Under **Client secrets**, select **+ New client secret**.
92
+
4. In **Description**, enter the Client Secret.
114
93
5. Under **Expires**, select an expiration.
115
-
116
94
6. Select **Add**.
95
+
7. Under **Client secrets**, from the **Value** field, copy the value. Consider the value an application password. The example value appears, Azure values appear in the Cloudflare Access configuration.
117
96
118
-
7. Under **Client secrets**, from the **Value** field, copy the value. Consider the value an application password. This example's value is visible, Azure values appear in the Cloudflare Access configuration.
119
-
120
-

97
+

121
98
122
99
### Permissions
123
100
124
101
1. In the left menu, select **API permissions**.
125
-
126
-
2. Select **+****Add a permission**.
127
-
102
+
2. Select **+ Add a permission**.
128
103
3. Under **Select an API**, select **Microsoft Graph**.
129
104
130
-

105
+

131
106
132
107
4. Select **Delegated permissions** for the following permissions:
133
108
134
-
-`Email`
135
-
136
-
-`openid`
137
-
138
-
-`profile`
109
+
* Email
110
+
* openid
111
+
* profile
112
+
* offline_access
113
+
* user.read
114
+
* directory.read.all
115
+
* group.read.all
139
116
140
-
-`offline_access`
141
117
142
-
-`user.read`
118
+
5. Under **Manage**, select **+ Add permissions**.
143
119
144
-
-`directory.read.all`
120
+
[](./media/cloudflare-azure-ad-integration/request-api-permissions.png#lightbox)
145
121
146
-
-`group.read.all`
147
-
148
-
5. Under **Manage**, select **+****Add permissions**.
149
-
150
-
[](./media/cloudflare-azure-ad-integration/request-api-permissions.png#lightbox)
151
122
152
123
153
124
6. Select **Grant Admin Consent for ...**.
154
125
155
-
[](./media/cloudflare-azure-ad-integration/grant-admin-consent.png#lightbox)
126
+
[](./media/cloudflare-azure-ad-integration/grant-admin-consent.png#lightbox)
156
127
157
128
158
-
7. On the [Cloudflare Zero Trust dashboard](https://dash.teams.cloudflare.com/),
159
-
navigate to **Settings> Authentication**.
160
129
130
+
7. On the Cloudflare Zero Trust dashboard, navigate to **Settings > Authentication**.
161
131
8. Under **Login methods**, select **Add new**.
162
-
163
132
9. Select **Azure AD**.
164
-
165
-
10. Enter the Application ID, Application secret, and Directory ID values.
166
-
167
-
>[!NOTE]
168
-
>For Azure AD groups, in **Edit your Azure AD identity provider**, for **Support Groups** select **On**.
169
-
133
+
10. Enter values for **Application ID**, **Application Secret**, and **Directory ID**.
170
134
11. Select **Save**.
171
135
172
-
## Test the integration
136
+
>[!NOTE]
137
+
>For Azure AD groups, in **Edit your Azure AD identity provider**, for **Support Groups** select **On**.
173
138
174
-
1. To test the integration on the Cloudflare Zero Trust dashboard,
175
-
navigate to **Settings** > **Authentication**.
139
+
## Test the integration
176
140
141
+
1. On the Cloudflare Zero Trust dashboard, navigate to **Settings** > **Authentication**.
177
142
2. Under **Login methods**, for Azure AD select **Test**.
178
143
179
-

144
+

180
145
181
146
3. Enter Azure AD credentials.
182
-
183
147
4. The **Your connection works** message appears.
184
148
185
-

149
+

186
150
187
-
## Next steps
188
151
189
-
-[Integrate single sign-on (SSO) with Cloudflare](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/)
152
+
## Next steps
190
153
191
-
-[Cloudflare integration with Azure AD B2C](../../active-directory-b2c/partner-cloudflare.md)
154
+
- Go to developer.cloudflare.com for [Integrate SSO](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/)
155
+
-[Tutorial: Configure Cloudflare Web Application Firewall with Azure AD B2C](../../active-directory-b2c/partner-cloudflare.md)
0 commit comments