Skip to content

Commit 0d1b57d

Browse files
[CF1] IdP-initiated SSO dash login
1 parent 25afe91 commit 0d1b57d

File tree

1 file changed

+37
-1
lines changed

1 file changed

+37
-1
lines changed

src/content/docs/cloudflare-one/applications/configure-apps/dash-sso-apps.mdx

Lines changed: 37 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,46 @@ Cloudflare recommends carefully storing your [Global API key](/fundamentals/api/
5858
Cloudflare dashboard SSO does not support:
5959

6060
- Users with plus-addressed emails, such as `[email protected]`. If you have users like this added to your Cloudflare organization, they will be unable to login with SSO.
61-
- IdP-initiated logins (such as a tile in Okta). All login attempts must originate from `https://dash.cloudflare.com`. You can create a bookmark for this URL in your IdP to assist users.
6261
- Adding a separate email-based policy to the SSO application that does not match your SSO domain policy. As your account team must [approve and create your SSO domain](/cloudflare-one/applications/configure-apps/dash-sso-apps/#2-contact-your-account-team) based on the [SSO domain requirements](/cloudflare-one/applications/configure-apps/dash-sso-apps/#sso-domain-requirements), adding a new domain policy on your own will not work.
6362
- Deleting the auto-generated `allow email domain` policy. If this policy was deleted, your organization's administrators would not be able to access the Cloudflare dashboard.
6463

64+
## IdP-initiated SSO
65+
66+
IdP-initiated login is supported for Cloudflare Dashboard SSO, with configuration available via your Identity Provider (IdP).
67+
68+
A step-by-step guide is currently available for Okta, and similar configurations are possible with other identity providers that support custom SSO endpoints.
69+
70+
### Okta
71+
72+
Configure an Identity Provider (IdP)-initiated Single Sign-On (SSO) session using Cloudflare Zero Trust and Okta.
73+
74+
#### Prerequisites
75+
76+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go **Access** > **Applications** > select your **SSO App**.
77+
2. Select **Configure** to access the application settings.
78+
3. In the **Basic Information** section, find the **SSO Endpoint URL** and copy it. You will need the copied **SSO Endpoint URL** for your IdP setup.
79+
80+
#### Configure Okta as the IdP
81+
82+
1. Log in to your [Okta Admin Dashboard](https://login.okta.com/) and go to **Applications** > **Applications**.
83+
2. Select **Create App Integration** to start a new SAML integration to handle the IdP-initated SSO flow.
84+
3. In the pop-up, select **SAML 2.0** and select **Next**.
85+
4. Enter a name for the app and select **Next**.
86+
5. In the **Single Sign-On URL** field, paste the **SSO Endpoint URL** [you copied earlier](/cloudflare-one/applications/configure-apps/dash-sso-apps/#prerequisites-1).
87+
6. Set the **Name ID Format** to **EmailAddress**.
88+
7. Set the **Application Username** to **Email**.
89+
8. Select **Next** > **Finish** to save the integration.
90+
9. Test the integration by going to your Okta User Dashboard, locating the new app tile, and selecting it to verify the SSO flow.
91+
92+
**(Optional) Enforce single IdP login with Instant Auth**
93+
94+
If you use only one IdP (for exampple, Okta) for Cloudflare SSO and want users to skip the identity provider selection prompt:
95+
96+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go **Access** > **Applications** > select your **SSO App**.
97+
2. Go to **Login methods**.
98+
3. Disable **Accept all available identity providers** and ensure only Okta is selected as the login method.
99+
4. Enable **Instant Auth** to allow users to skip identity provider selection.
100+
65101
## Bypass dashboard SSO
66102

67103
This section describes how to restore access to the Cloudflare dashboard in case you are unable to login with SSO.

0 commit comments

Comments
 (0)