You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
7. Name your identity provider and fill in the required fields with the information obtained in Step 3.
41
39
42
-
8. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/) if the protocol is supported by your IdP. PKCE will be performed on all login attempts.
40
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
43
41
44
-
9. (Optional) To enable SCIM, refer to [Synchronize users and groups](#synchronize-users-and-groups).
42
+
2. Under **Login methods**, select **Add new**.
45
43
46
-
10. (Optional) Under **Optional configurations**, enter [custom OIDC claims](#oidc-claims) that you wish to add to users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
44
+
6. Choose **OpenID Connect**..
47
45
48
-
11. Select **Save**.
46
+
3. Name your identity provider and fill in the required fields with the information obtained in Step 3.
47
+
48
+
4. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/) if the protocol is supported by your IdP. PKCE will be performed on all login attempts.
49
+
50
+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](#synchronize-users-and-groups).
51
+
52
+
6. (Optional) Under **Optional configurations**, enter [custom OIDC claims](#oidc-claims) that you wish to add to users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
53
+
54
+
7. Select **Save**.
55
+
56
+
</TabItem> <TabItemlabel="API">
57
+
58
+
1.[Create an API token](/fundamentals/api/get-started/create-token/) with the following permissions:
59
+
| Type | Item | Permission |
60
+
| ------- | ---------------- | ---------- |
61
+
| Account | Access: Organizations, Identity Providers, and Groups | Edit |
62
+
63
+
2. Make a `POST` request to the [Identity Providers](/api/resources/zero_trust/subresources/identity_providers/methods/create/) endpoint:
The following example requires Cloudflare provider version `>=4.40.0`.
89
+
:::
90
+
91
+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
92
+
-`Access: Organizations, Identity Providers, and Groups Write`
93
+
94
+
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/zero_trust_access_identity_provider) resource:
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test. On success, a confirmation screen displays.
51
119
@@ -92,23 +160,6 @@ Cloudflare Access extends support for multi-record OIDC claims. These claims are
92
160
93
161
Cloudflare Access does not support partial OIDC claim value references or OIDC scopes.
0 commit comments