Skip to content

Commit 575b6d2

Browse files
kennyj42ranbel
andauthored
Add call out that groups must match exactly (#18743)
* Update generic-saml.mdx add call out for Groups match * Update generic-oidc.mdx * Update jumpcloud-saml.mdx * groups SCIM attribute * Update src/content/docs/cloudflare-one/identity/idp-integration/jumpcloud-saml.mdx --------- Co-authored-by: Ranbel Sun <[email protected]> Co-authored-by: ranbel <[email protected]>
1 parent f843af6 commit 575b6d2

File tree

3 files changed

+21
-13
lines changed

3 files changed

+21
-13
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/generic-oidc.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,12 @@ Your identity provider must support SCIM version 2.0.
6868

6969
Setup instructions vary depending on the identity provider. In your identity provider, you will either need to edit the [original SSO application](/cloudflare-one/identity/idp-integration/generic-oidc/#set-up-a-generic-oidc) or create a new SCIM application. Refer to your identity provider's documentation for more details. For example instructions, refer to our [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) or [Jumpcloud](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#synchronize-users-and-groups) guides.
7070

71-
:::note
72-
If your IdP requires creating a new SCIM application, ensure that the groups in the SCIM application match the groups in the [original SSO application](/cloudflare-one/identity/idp-integration/generic-oidc/#set-up-a-generic-oidc). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
73-
:::
71+
#### IdP groups
72+
73+
If you would like to build policies based on IdP groups:
74+
75+
- Ensure that your IdP sends a `groups` field. The naming must match exactly (case insensitive). All other values will be sent as a OIDC claim.
76+
- If your IdP requires creating a new SCIM application, ensure that the groups in the SCIM application match the groups in the [original SSO application](/cloudflare-one/identity/idp-integration/generic-oidc/#set-up-a-generic-oidc). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
7477

7578
### 3. Verify SCIM provisioning
7679

src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,12 @@ Your identity provider must support SCIM version 2.0.
7474

7575
Setup instructions vary depending on the identity provider. In your identity provider, you will either need to edit the [original SSO application](#1-create-an-application-in-your-identity-provider) or create a new SCIM application. Refer to your identity provider's documentation for more details. For example instructions, refer to our [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) or [JumpCloud](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#synchronize-users-and-groups) guides.
7676

77-
:::note
78-
If your IdP requires creating a new SCIM application, ensure that the groups in the SCIM application match the groups in the [original SSO application](/cloudflare-one/identity/idp-integration/generic-saml/#1-create-an-application-in-your-identity-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
79-
:::
77+
#### IdP groups
78+
79+
If you would like to build policies based on IdP groups:
80+
81+
- Ensure that your IdP sends a `groups` field. The naming must match exactly (case insensitive). All other values will be sent as a SAML attribute.
82+
- If your IdP requires creating a new SCIM application, ensure that the groups in the SCIM application match the groups in the [original SSO application](/cloudflare-one/identity/idp-integration/generic-saml/#1-create-an-application-in-your-identity-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
8083

8184
### 3. Verify SCIM provisioning
8285

src/content/docs/cloudflare-one/identity/idp-integration/jumpcloud-saml.mdx

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,13 +81,15 @@ The JumpCloud integration allows you to synchronize user groups and automaticall
8181

8282
1. In the [JumpCloud Admin Portal](https://console.jumpcloud.com/#/home), go to **SSO Applications**.
8383
2. Select the Cloudflare application that was created when you [Set up JumpCloud as a SAML provider](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#set-up-jumpcloud-as-a-saml-provider).
84-
3. Select the **Identity Management** tab.
85-
4. Make sure that **Enable management of User Groups and Group Membership in this application** is turned on.
86-
5. Select **Configure**.
87-
6. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
88-
7. In the **Token Key** field, enter the **SCIM Secret** obtained from Zero Trust.
89-
8. Select **Activate**. You will receive a confirmation that the Identity Management integration has been successfully verified.
90-
9. Select **Save**.
84+
3. Select the **SSO** tab.
85+
3. To provision user groups, select **Include group attribute** and enter `groups`. The group attribute name has to exactly match `groups` or else it will be sent as a SAML attribute.
86+
5. Select the **Identity Management** tab.
87+
6. Make sure that **Enable management of User Groups and Group Membership in this application** is turned on.
88+
7. Select **Configure**.
89+
8. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
90+
9. In the **Token Key** field, enter the **SCIM Secret** obtained from Zero Trust.
91+
10. Select **Activate**. You will receive a confirmation that the Identity Management integration has been successfully verified.
92+
11. Select **Save**.
9193

9294
<Render file="access/verify-scim-provisioning"/>
9395

0 commit comments

Comments
 (0)