Skip to content

Commit 2faef9d

Browse files
committed
SaaS app UI instructions
1 parent 87c6ee3 commit 2faef9d

File tree

2 files changed

+18
-15
lines changed

2 files changed

+18
-15
lines changed

src/content/docs/cloudflare-one/applications/configure-apps/mcp-servers/linked-apps.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ sidebar:
88

99
import { Render, GlossaryTooltip } from "~/components"
1010

11-
Cloudflare Access can delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to an [Access for SaaS MCP server](/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/) via <GlossaryTooltip term="OAuth">OAuth</GlossaryTooltip>. The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes.
11+
Cloudflare Access can delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to an [Access for SaaS MCP server](/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/) via [OAuth](https://modelcontextprotocol.io/specification/2025-03-26/basic/authorization). The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes.
1212

1313
For example, your organization may wish to deploy an MCP server that helps employees interact with internal Atlassian applications. You can configure [Access policies](/cloudflare-one/policies/access/#selectors) to ensure that only authorized users can access those applications, either directly or by using an <GlossaryTooltip term="MCP client">MCP client</GlossaryTooltip>.
1414

src/content/docs/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp.mdx

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,22 +18,25 @@ You can secure <GlossaryTooltip term="MCP server">Model Context Protocol (MCP) s
1818

1919
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
2020
2. Select **SaaS**.
21-
3. For **Application**, select *Salesforce*.
22-
4. For the authentication protocol, select **OIDC**.
21+
3. In **Application**, enter a custom name (for example, `MCP server`) and select the textbox that appears below.
22+
4. Select **OIDC** as the authentication protocol.
2323
5. Select **Add application**.
24-
6. In **Scopes**, select the attributes that you want Access to send in the ID token.
25-
7. In **Redirect URLs**, enter the callback URL obtained from Salesforce (`https://<your-domain>.my.salesforce.com/services/authcallback/<URL Suffix>`). Refer to [Add a SSO provider to Salesforce](#2-add-a-sso-provider-to-salesforce) for instructions on obtaining this value.
26-
8. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/) if the protocol is supported by your IdP. PKCE will be performed on all login attempts.
27-
9. Copy the following values:
28-
* **Client ID**
29-
* **Client Secret**
30-
* **Authorization endpoint**
31-
* **Token endpoint**
32-
* **User info endpoint**
33-
10. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
34-
11. (Optional) In **Experience settings**, configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) by turning on **Enable App in App Launcher** and, in **App Launcher URL**, entering `https://<your-domain>.my.salesforce.com`.
35-
12. Save the application.
24+
6. In **Redirect URLs**, enter the authorization callback URL for your MCP server (for example, `https://<SERVER-NAME>.<SUBDOMAIN>.workers.dev/callback`). Refer to your MCP server documentation for instructions on obtaining this value.
25+
7. Copy the following values to input into your MCP server's OAuth configuration. Different MCP servers may require different sets of input values.
26+
- **Client secret**
27+
- **Client ID**
28+
- **Configuration endpoint**
29+
- **Issuer**
30+
- **Token endpoint**
31+
- **Authorization endpoint**
32+
- **Key endpoint**
33+
- **Userinfo endpoint**
34+
8. (Optional) Under **Advanced settings**, turn on [**Refresh tokens**](/cloudflare-one/applications/configure-apps/saas-apps/generic-oidc-saas/#advanced-settings) to reduce the number of times a user needs to log in to the identity provider.
35+
9. Configure [Access policies](/cloudflare-one/policies/access/) to define the users can access the MCP server.
36+
10. Save the application.
3637

3738
## 2. Configure your MCP server
3839

40+
41+
3942
## Deploy an example MCP server

0 commit comments

Comments
 (0)