Skip to content

Commit 5b4aba9

Browse files
ranbelkodster28
authored andcommitted
update SaaS apps (#19397)
1 parent a4284b9 commit 5b4aba9

35 files changed

+121
-189
lines changed

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/adobe-sign-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,8 @@ This guide covers how to configure [Adobe Acrobat Sign](https://helpx.adobe.com/
4444
* **Entity ID**: Entity ID/SAML Audience from Adobe Acrobat Sign SAML SSO configuration.
4545
* **Assertion Consumer Service URL**: Assertion Consumer URL from Adobe Acrobat Sign SAML SSO configuration.
4646
* **Name ID format**: *Email*
47-
2. Select **Save configuration**.
48-
3. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
49-
4. Select **Done**.
47+
2. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
48+
3. Save the application.
5049

5150
## 4. Test the integration and finalize configuration
5251

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/area-1.mdx

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,21 +32,11 @@ sidebar:
3232
| **Assertion Consumer Service URL** | `https://horizon.area1security.com/api/users/saml` |
3333
| **Name ID Format** | *Email* |
3434

35-
6. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.
35+
6. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
3636

37-
7. Choose the **Identity providers** you want to enable for your application.
37+
7. Save the application.
3838

39-
8. Turn on **Instant Auth** if you are selecting only one login method for your application, and would like your end users to skip the identity provider selection step.
40-
41-
9. Select **Next**.
42-
43-
## 2. Add an Access policy
44-
45-
1. To control who can access your application, [create an Access policy](/cloudflare-one/policies/access/).
46-
47-
2. Select **Next**.
48-
49-
## 3. Configure SSO for Area 1
39+
## 2. Configure SSO for Area 1
5040

5141
Finally, you will need to configure Area 1 to allow users to log in through Cloudflare Access.
5242

@@ -74,6 +64,4 @@ Finally, you will need to configure Area 1 to allow users to log in through Clou
7464

7565
7. Select **Update Settings**.
7666

77-
8. In Zero Trust, select **Done**.
78-
79-
Your application will appear on the **Applications** page. If you added the application to your App Launcher, you can test the integration by going to `<your-team-name>.cloudflareaccess.com`.
67+
If you added the application to your App Launcher, you can test the integration by going to `<your-team-name>.cloudflareaccess.com`.

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/asana-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,8 @@ This guide covers how to configure [Asana](https://help.asana.com/hc/en-us/artic
2626
* **Assertion Consumer Service URL**: `https://app.asana.com/-/saml/consume`
2727
* **Name ID format**: *Email*
2828
7. Copy the **SSO endpoint** and **Public key**.
29-
8. Select **Save configuration**.
30-
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
31-
10. Select **Done**.
29+
8. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
30+
9. Save the application.
3231

3332
## 2. Add a SAML SSO provider to Asana
3433

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/atlassian-saas.mdx

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This guide covers how to configure [Atlassian Cloud](https://support.atlassian.c
2424
4. For the authentication protocol, select **SAML**.
2525
5. Select **Add application**.
2626
6. Copy the **Access Entity ID or Issuer**, **Public key**, and **SSO endpoint**.
27-
7. Keep this window open without selecting **Select configuration**. You will finish this configuration in step [4. Finish adding a SaaS application to Cloudflare Zero Trust](#4-finish-adding-a-saas-application-to-cloudflare-zero-trust).
27+
7. Keep this window open. You will finish this configuration in step [4. Finish adding a SaaS application to Cloudflare Zero Trust](#4-finish-adding-a-saas-application-to-cloudflare-zero-trust).
2828

2929
## 2. Create a x.509 certificate
3030

@@ -38,13 +38,9 @@ This guide covers how to configure [Atlassian Cloud](https://support.atlassian.c
3838
3. For **Directory name**, enter your desired name. For example, you could enter `Cloudflare Access`.
3939
4. Select **Add** > **Set up SAML single sign-on** > **Next**.
4040

41-
:::note
42-
43-
44-
This screen will advise you to create an authentication policy before proceeding. You will do this in step [5. Create an application policy to test integration](#5-create-an-authentication-policy-to-test-integration).
45-
46-
47-
:::
41+
:::note
42+
This screen will advise you to create an authentication policy before proceeding. You will do this in step [5. Create an application policy to test integration](#5-create-an-authentication-policy-to-test-integration).
43+
:::
4844

4945
5. Fill in the following fields:
5046
* **Identity provider Entity ID**: Access Entity ID or Issuer from application configuration in Cloudflare Zero Trust.
@@ -62,9 +58,8 @@ This screen will advise you to create an authentication policy before proceeding
6258
* **Entity ID**: Service provider entity URL from Atlassian Cloud SAML SSO set-up.
6359
* **Assertion Consumer Service URL**: Service provider assertion comsumer service URL from Atlassian Cloud SAML SSO set-up.
6460
* **Name ID format**: *Email*
65-
2. Select **Save configuration**.
66-
3. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
67-
4. Select **Done**.
61+
2. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
62+
3. Save the application.
6863

6964
## 5. Create an authentication policy to test integration
7065

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/aws-sso-saas.mdx

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,8 @@ Next, we will obtain **Identity provider metadata** from Zero Trust.
4040
1. Copy the **SAML Metadata endpoint**.
4141
2. In a separate browser window, go to the SAML Metadata endpoint (`https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/sso/saml/xxx/saml-metadata`).
4242
3. Save the page as `access_saml_metadata.xml`.
43-
9. Save your SaaS application configuration.
44-
10. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
45-
11. Select **Done**.
43+
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
44+
10. Save the application.
4645

4746
## 3. Complete AWS configuration
4847

@@ -60,7 +59,7 @@ Access for SaaS does not currently support [SCIM provisioning](/cloudflare-one/i
6059

6160
1. Users are created in both your identity provider and AWS.
6261
2. Users have matching usernames in your identity provider and AWS.
63-
3. Usernames are email addresses. This is the only format AWS supports with third-party SSO providers.
62+
3. Usernames are email addresses. This is the only format AWS supports with third-party SSO providers.
6463
:::
6564

6665
## 4. Test the integration

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/braintree-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,8 @@ This guide covers how to configure [Braintree](https://developer.paypal.com/brai
2626
* **Assertion Consumer Service URL**: `https://www.placeholder.com`
2727
* **Name ID format**: *Email*
2828
7. Copy the **SSO endpoint** and **Public key**.
29-
8. Select **Save configuration**.
30-
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
31-
10. Select **Done**.
29+
8. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
30+
9. Save the application.
3231

3332
## 2. Enable SSO Configuration in Braintree
3433

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/coupa-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,8 @@ This guide covers how to configure [Coupa](https://compass.coupa.com/en-us/produ
2828
* **Name ID format**: *Email*
2929
7. Copy the **Access Entity ID or Issuer** and **SAML Metadata Endpoint**.
3030
8. In **Default relay state**, enter `https://<your-subdomain>.coupahost.com/sessions/saml_post`.
31-
9. Select **Save configuration**.
32-
10. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
33-
11. Select **Done**.
31+
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
32+
10. Save the application.
3433

3534
## 2. Download the metadata file
3635

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/digicert-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,8 @@ This guide covers how to configure [Digicert](https://docs.digicert.com/en/certc
2727
* **Assertion Consumer Service URL**: `https://www.digicert.com/account/sso/`
2828
* **Name ID format**: *Email*
2929
7. Copy the **SAML Metadata endpoint**.
30-
8. Select **Save configuration**.
31-
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
32-
10. Select **Done**.
30+
8. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
31+
9. Save the application.
3332

3433
## 2. Add a SAML SSO provider in Digicert
3534

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/docusign-access.mdx

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -45,20 +45,17 @@ This guide covers how to configure [Docusign](https://support.docusign.com/s/doc
4545

4646
7. Set an Access policy (for example, create a policy based on _Emails ending in @example.com_).
4747

48-
8. Copy and save SSO Endpoint, Entity ID and Public Key.
48+
8. Copy and save the **SSO Endpoint**, **Entity ID** and **Public Key**.
4949

50-
:::note
50+
9. Transform the **Public Key** into a fingerprint:
5151

52-
The Public key must be transformed into a fingerprint. To do that:
52+
1. Copy the **Public Key** Value.
5353

54-
9. Copy the Public Key Value.
54+
2. Paste the **Public Key** into VIM or another code editor.
5555

56-
10. Paste the Public Key into VIM or another code editor.
56+
3. Wrap the value in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
5757

58-
11. Wrap the value in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
59-
60-
12. Set the file extension to `.crt` and save.
61-
:::
58+
4. Set the file extension to `.crt` and save.
6259

6360
## 2. Configure your DocuSign SSO instance
6461

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/dropbox-saas.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,8 @@ This guide covers how to configure [Dropbox](https://help.dropbox.com/security/s
2626
* **Assertion Consumer Service URL**: `https://www.dropbox.com/saml_login`
2727
* **Name ID format**: *Email*
2828
7. Copy the **SSO endpoint** and **Public key**.
29-
8. Select **Save configuration**.
30-
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
31-
10. Select **Done**.
29+
8. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
30+
9. Save the application.
3231

3332
## 2. Create a certificate file
3433

0 commit comments

Comments
 (0)