Skip to content

Commit 15e1b43

Browse files
Apply suggestions from code review
1 parent 849f086 commit 15e1b43

File tree

1 file changed

+15
-14
lines changed
  • src/content/docs/fundamentals/setup/account/account-security

1 file changed

+15
-14
lines changed

src/content/docs/fundamentals/setup/account/account-security/scim-setup.mdx

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -30,15 +30,15 @@ Accounts provisioned with SCIM need to verify their email addresses.
3030
:::
3131

3232
---
33-
## Gather required data
33+
## Gather the required data
3434

3535
To start, you will need to collect a couple of pieces of data from Cloudflare and set these aside for later use.
3636

3737
### Get your Account ID
3838

39-
1. Navigate to the Account you want to configure for SCIM
4039

41-
2. In your browser's navigation bar, copy the Account ID from the URL. The URL should be in the format `https://dash.cloudflare.com/<accountID>`
40+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), go to the Cloudflare account that you want to configure for SCIM provisioning.
41+
2. Copy your account ID from the account home page.
4242

4343
### Create an API token
4444

@@ -92,28 +92,29 @@ To start, you will need to collect a couple of pieces of data from Cloudflare an
9292
1. In **Provisioning to App**, select **Edit**.
9393
2. Enable **Create Users** and **Deactivate Users**. Select **Save**.
9494
3. In the integration page, go to **Assignments** > **Assign** > **Assign to Groups**.
95-
4. Choose group(s) that you want to provision to Cloudflare.
95+
4. Choose the group(s) that you want to provision to Cloudflare.
9696
5. Select **Done**.
9797

9898
This will provision all of the users in the group(s) affected to your Cloudflare account with "minimal account access."
9999

100100
### Configure user permissions
101101

102-
There are two options for managing user permissions
103-
* Manage your user permissions on a per-user basis in the Dashboard, API, or using Terraform.
102+
There are two options for managing user permissions:
103+
104+
* Manage your user permissions on a per-user basis in the Cloudflare dashboard, API, or using Terraform.
104105
* Map your IdP groups to a Cloudflare built-in [Role](/fundamentals/setup/manage-members/roles/). Groups may only be linked to one role.
105106

106107
1. Go to your SCIM application in the App Integration Catalog, then select **Provisioning**.
107108
2. Under **To App*, select **Edit**.
108109
3. Enable **Create Users** and **Deactivate Users**. Select **Save**.
109-
4. Go to **Push Groups**
110-
5. Click **+ Push Groups**, then **Find groups by name**
111-
6. Type in the name of the group(s) you want to sync to Cloudflare.
112-
7. Choose Link Group
113-
8. Cloudflare provisioned user groups named in the pattern `CF-<accountID> - <Role Name>`. Choose the appropriate group that maps to your target role.
114-
6. Disable **Rename groups**. Select **Save**.
115-
7. Within the **Push Groups** tab, select **Push Groups**.
116-
8. Add the groups you created.
110+
4. Go to **Push Groups**.
111+
5. Select **+ Push Groups**, then **Find groups by name**.
112+
6. Enter the name of the group(s) that you want to sync to Cloudflare.
113+
7. Choose **Link Group**.
114+
8. Cloudflare provisioned user groups are named in the pattern `CF-<accountID> - <Role Name>`. Choose the appropriate group that maps to your target role.
115+
9. Disable **Rename groups**. Select **Save**.
116+
10. Within the **Push Groups** tab, select **Push Groups**.
117+
11. Add the groups you created.
117118
9. Select **Save**.
118119

119120
Adding any users to these groups will grant them the role. Removing the users from the identity provider will remove them from the associated role.

0 commit comments

Comments
 (0)