Skip to content

Commit 1d5a53b

Browse files
committed
SCIM logs
1 parent f786630 commit 1d5a53b

File tree

4 files changed

+45
-5
lines changed

4 files changed

+45
-5
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ SCIM requires a separate enterprise application from the one created during [ini
222222

223223
12. On the **Provisioning** page, select **Start provisioning**. You will see the synchronization status in Entra ID.
224224

225-
To check which users and groups were synchronized, select **View provisioning logs**.
225+
To check which users and groups were synchronized, select **View provisioning logs** in Entra ID.
226226

227227
<Render file="access/verify-scim-provisioning" />
228228

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
pcx_content_type: reference
3+
title: SCIM activity logs
4+
sidebar:
5+
order: 3
6+
label: SCIM logs
7+
---
8+
9+
import { Render } from "~/components";
10+
11+
SCIM activity logs allow administrators to audit how [SCIM provisioning](/cloudflare-one/identity/users/scim/) events in an identity provider (such as create, update, and delete) affect a user's identity and group membership in Zero Trust. You can compare your Zero Trust SCIM logs with your identity provider's SCIM logs to track how identity data is shared between the two services and pinpoint the source of any provisioning errors.
12+
13+
## View SCIM logs
14+
15+
For an overview of SCIM events across all users, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **SCIM provisioning**. This page lists the inbound SCIM requests from all identity providers configured with SCIM. You can select an individual request to view more details about the SCIM operation.
16+
17+
To investigate how SCIM events impacted a specific user, go to their [User Registry identity](/cloudflare-one/insights/logs/users/).
18+
19+
<Render file="access/scim-requires-login" product="cloudflare-one" />
20+
21+
## Log fields
22+
23+
SCIM provisioning logs show the following information for each inbound SCIM request:
24+
25+
- **IdP name**: UUID of the identity provider
26+
- **Timestamp**: Date and time of the request
27+
- **Action**: HTTP request method (`POST`, `PATCH`, `DELETE`)
28+
- **User email**: User who received the SCIM identity update
29+
- **Resource type**: Identity attribute that was modified (`GROUP` or ?)
30+
- **CF resource ID**:
31+
- **Outcome**: HTTP request response (`SUCCESS` or `ERROR`)
32+
- **Request body**: HTTP request body containing the data that was added, modified, or removed
33+
- **JSON log**: SCIM request log in JSON format
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
{}
3+
---
4+
5+
:::note
6+
New users must first [register the WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) or authenticate to an Access application before SCIM provisioning can begin.
7+
:::

src/content/partials/cloudflare-one/access/verify-scim-provisioning.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
{}
33
---
44

5-
To check if a user's identity was updated in Zero Trust, view their [User Registry identity](/cloudflare-one/insights/logs/users/).
5+
import { Render } from "~/components";
66

7-
:::note
8-
New users must first register the WARP client or authenticate to an Access application before SCIM provisioning can begin.
9-
:::
7+
To check if user identities were updated in Zero Trust, view your [SCIM provisioning logs](/cloudflare-one/insights/logs/scim-logs/).
8+
9+
<Render file="access/scim-requires-login" product="cloudflare-one" />

0 commit comments

Comments
 (0)