You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/fundamentals/setup/account/account-security/scim-setup.mdx
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,17 +11,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros
11
11
12
12
## Limitations
13
13
14
-
* If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
15
-
* Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
16
-
* Cloudflare does not currently allow custom group names to leave space for future development.
14
+
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
15
+
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
16
+
- Cloudflare does not currently allow custom group names to leave space for future development.
17
17
18
18
## Prerequisites
19
19
20
-
* Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
21
-
* In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
22
-
* In your identity provider, the ability to create applications and groups.
20
+
- Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
21
+
- In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
22
+
- In your identity provider, the ability to create applications and groups.
23
23
24
-
***
24
+
:::note
25
+
26
+
Accounts provisioned with SCIM need to verify their email addresses.
27
+
:::
28
+
29
+
---
25
30
26
31
## Create an API token
27
32
@@ -42,27 +47,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros
42
47
43
48
5. Copy the token value.
44
49
45
-
***
50
+
---
46
51
47
52
## Provision with Okta
48
53
49
54
### Set up your Okta SCIM application.
50
55
51
56
1. In the Okta dashboard, go to **Applications** > **Applications**.
52
-
53
57
2. Select **Browse App Catalog**.
54
-
55
58
3. Locate and select **SCIM 2.0 Test App (OAuth Bearer Token)**.
56
-
57
59
4. Select **Add Integration** and name your integration.
58
-
59
60
5. Enable the following options:
60
61
61
62
***Do not display application icon to users**
62
63
***Do not display application icon in the Okta Mobile App**
63
64
64
65
6. Disable **Automatically log in when user lands on login page**.
65
-
66
66
7. Select **Next**, then select **Done**.
67
67
68
68
### Integrate the Cloudflare API.
@@ -102,7 +102,7 @@ This will provision all of the users affected to your Cloudflare account with "m
102
102
103
103
Adding any users to these groups will grant them the role. Removing the users from the identity provider will remove them from the associated role.
104
104
105
-
***
105
+
---
106
106
107
107
## Provision with Microsoft Entra ID
108
108
@@ -134,4 +134,4 @@ Refer to the list of [Roles](/fundamentals/setup/manage-members/roles/) for more
134
134
4. Select **All records** under Source Object Scope.
135
135
5. Select **Add scoping filter** and create the appropriate filtering criteria to capture only the necessary groups.
136
136
6. Save the Attribute Mapping by selecting **OK** and return to the Enterprise Application Provisioning overview page.
137
-
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
137
+
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
0 commit comments