Skip to content

Commit 1d6690c

Browse files
[CF1] generic saml cert expiration (#20325)
* [CF1] generic saml cert expiration * Update src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx Co-authored-by: Jun Lee <[email protected]> * fix indent * editing for indentation * Update src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx * indentation * Update src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx --------- Co-authored-by: Jun Lee <[email protected]>
1 parent 8081dda commit 1d6690c

File tree

1 file changed

+29
-25
lines changed

1 file changed

+29
-25
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx

Lines changed: 29 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 2
66
---
77

8-
import { Tabs, TabItem, Render } from '~/components';
8+
import { Tabs, TabItem, Render } from "~/components";
99

1010
Cloudflare Zero Trust integrates with any identity provider that supports SAML 2.0. If your identity provider is not listed in the integration list of login methods in Zero Trust, it can be configured using SAML 2.0 (or OpenID if OIDC based). Generic SAML can also be used if you would like to pass additional SAML headers or claims for an IdP in the integration list.
1111

@@ -43,7 +43,6 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web
4343

4444
## 2. Add a SAML identity provider to Zero Trust
4545

46-
4746
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
4847

4948
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication** > **Login methods**.
@@ -60,28 +59,36 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web
6059
The following example requires Cloudflare provider version `>=4.40.0`.
6160
:::
6261

63-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
62+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
63+
6464
- `Access: Organizations, Identity Providers, and Groups Write`
6565

66-
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
67-
68-
```tf
69-
resource "cloudflare_zero_trust_access_identity_provider" "generic_saml_example" {
70-
account_id = var.cloudflare_account_id
71-
name = "Generic SAML example"
72-
type = "saml"
73-
config {
74-
sso_target_url = "https://example.com/1234/sso/saml"
75-
issuer_url = "https://example.com/1234"
76-
idp_public_cert = "-----BEGIN CERTIFICATE-----\nXXXXX\n-----END CERTIFICATE-----"
77-
sign_request = false
78-
email_attribute_name = "email"
79-
attributes = ["employeeID", "groups"]
80-
}
81-
}
82-
```
66+
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
67+
68+
```tf
69+
resource "cloudflare_zero_trust_access_identity_provider" "generic_saml_example" {
70+
account_id = var.cloudflare_account_id
71+
name = "Generic SAML example"
72+
type = "saml"
73+
config {
74+
sso_target_url = "https://example.com/1234/sso/saml"
75+
issuer_url = "https://example.com/1234"
76+
idp_public_cert = "-----BEGIN CERTIFICATE-----\nXXXXX\n-----END CERTIFICATE-----"
77+
sign_request = false
78+
email_attribute_name = "email"
79+
attributes = ["employeeID", "groups"]
80+
}
81+
}
82+
```
83+
8384
</TabItem> </Tabs>
8485

86+
:::caution
87+
88+
Set a reminder for the expiry date of the signing certificate obtained from your generic SAML identity provider. After the certificate expires, you will need to generate a new signing certificate and re-add it to your Cloudflare configuration via the Cloudflare dashboard or Terraform.
89+
90+
:::
91+
8592
## 3. Test the connection
8693

8794
You can now [test the IdP integration](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust). A success response should return the configured SAML attributes.
@@ -96,10 +103,7 @@ Your identity provider must support SCIM version 2.0.
96103

97104
### 1. Enable SCIM in Zero Trust
98105

99-
<Render
100-
file="access/enable-scim-on-dashboard"
101-
params={{ idp: "IdP"}}
102-
/>
106+
<Render file="access/enable-scim-on-dashboard" params={{ idp: "IdP" }} />
103107

104108
### 2. Configure SCIM in the IdP
105109

@@ -114,7 +118,7 @@ If you would like to build policies based on IdP groups:
114118

115119
### 3. Verify SCIM provisioning
116120

117-
<Render file="access/verify-scim-provisioning"/>
121+
<Render file="access/verify-scim-provisioning" />
118122

119123
## Optional configurations
120124

0 commit comments

Comments
 (0)