Skip to content

Commit 63b0c01

Browse files
maxvpelithrar
authored andcommitted
[ZT] Rename Azure AD to Entra ID (#16997)
1 parent 2031905 commit 63b0c01

File tree

51 files changed

+589
-688
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+589
-688
lines changed

public/_redirects

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1529,6 +1529,7 @@
15291529
/cloudflare-one/analytics/access/ /cloudflare-one/insights/analytics/access/ 301
15301530
/cloudflare-one/analytics/gateway/ /cloudflare-one/insights/analytics/gateway/ 301
15311531
/cloudflare-one/analytics/users/ /cloudflare-one/insights/logs/users/ 301
1532+
/cloudflare-one/api-terraform/access-api-examples/azure-group/ /cloudflare-one/api-terraform/access-api-examples/entra-group/ 301
15321533
/cloudflare-one/applications/non-http/arbitrary-tcp/ /cloudflare-one/applications/non-http/cloudflared-authentication/arbitrary-tcp/ 301
15331534
/cloudflare-one/connections/connect-apps/configuration/ /cloudflare-one/connections/connect-networks/configure-tunnels/ 301
15341535
/cloudflare-one/connections/connect-apps/install-and-setup/setup/ /cloudflare-one/connections/connect-networks/get-started/ 301
@@ -1607,6 +1608,7 @@
16071608
/cloudflare-one/identity/devices/require-gateway/ /cloudflare-one/identity/devices/warp-client-checks/require-gateway/ 301
16081609
/cloudflare-one/identity/devices/require-warp/ /cloudflare-one/identity/devices/warp-client-checks/require-warp/ 301
16091610
/cloudflare-one/identity/devices/sentinel-one/ /cloudflare-one/identity/devices/warp-client-checks/sentinel-one/ 301
1611+
/cloudflare-one/identity/idp-integration/azuread/ /cloudflare-one/identity/entra-id/ 301
16101612
/cloudflare-one/identity/idp-integration/one-time-pin/ /cloudflare-one/identity/one-time-pin/ 301
16111613
/cloudflare-one/identity/idp-integration/saml-centrify/ /cloudflare-one/identity/idp-integration/centrify-saml/ 301
16121614
/cloudflare-one/identity/idp-integration/ping-saml/ /cloudflare-one/identity/idp-integration/pingfederate-saml/ 301
@@ -1636,6 +1638,8 @@
16361638
/support/traffic/argo-tunnel/ /cloudflare-one/connections/connect-networks/ 301
16371639
/support/traffic/argo-tunnel/exposing-applications-running-on-microsoft-azure-with-cloudflare-argo-tunnel/ /cloudflare-one/connections/connect-apps/deployment-guides/azure/ 301
16381640
/cloudflare-docs/content/cloudflare-one/tutorials/area-1/ /cloudflare-one/applications/configure-apps/saas-apps/area-1/ 301
1641+
/cloudflare-docs/content/cloudflare-one/tutorials/azuread-conditional-access/ /cloudflare-docs/content/cloudflare-one/tutorials/entra-id-conditional-access/ 301
1642+
/cloudflare-docs/content/cloudflare-one/tutorials/azuread-risky-users/ /cloudflare-docs/content/cloudflare-one/tutorials/entra-id-risky-users/ 301
16391643
/cloudflare-one/tutorials/zendesk-sso-saas/ /cloudflare-one/applications/configure-apps/saas-apps/zendesk-sso-saas/ 301
16401644
/cloudflare-one/tutorials/docusign-access/ /cloudflare-one/applications/configure-apps/saas-apps/docusign-access/ 301
16411645
/cloudflare-one/tutorials/hubspot-saas/ /cloudflare-one/applications/configure-apps/saas-apps/hubspot-saas/ 301

src/content/docs/cloudflare-one/api-terraform/access-api-examples/azure-group.mdx

Lines changed: 0 additions & 23 deletions
This file was deleted.
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
type: example
3+
summary: Allow members of a Microsoft Entra group. The ID is the group UUID (`id`) in Microsoft Entra ID.
4+
tags:
5+
- Microsoft Entra Group
6+
title: Microsoft Entra Group
7+
pcx_content_type: example
8+
sidebar:
9+
order: 4
10+
description: Allow members of a Microsoft Entra group. The ID is the group UUID (`id`) in Microsoft Entra ID.
11+
---
12+
13+
Allow members of a Microsoft Entra group. The ID is the group UUID (`id`) in Microsoft Entra ID:
14+
15+
```json
16+
{
17+
"azureAD": {
18+
"id": "86773093-5feb-48dd-814b-7ccd3676ff50",
19+
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
20+
}
21+
}
22+
```

src/content/docs/cloudflare-one/api-terraform/access-api-examples/github-org.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,19 @@
22
type: example
33
summary: Allow members of a specific GitHub organization.
44
tags:
5-
- GitHub Organization
5+
- GitHub Organization
66
title: GitHub™ Organization
77
pcx_content_type: example
88
sidebar:
99
order: 4
1010
description: Allow members of a specific GitHub organization.
11-
1211
---
1312

1413
```json
1514
{
16-
"github-organization": {
17-
"name": "cloudflare",
18-
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
19-
}
15+
"github-organization": {
16+
"name": "cloudflare",
17+
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
18+
}
2019
}
2120
```

src/content/docs/cloudflare-one/api-terraform/access-api-examples/gsuite-group.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,19 @@
22
type: example
33
summary: Allow members of a specific G Suite group.
44
tags:
5-
- G Suite® Group
6-
title: G Suite® Group
5+
- G Suite Group
6+
title: G Suite Group
77
pcx_content_type: example
88
sidebar:
99
order: 4
1010
description: Allow members of a specific G Suite group.
11-
1211
---
1312

1413
```json
1514
{
16-
"gsuite": {
17-
"email": "[email protected]",
18-
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
19-
}
15+
"gsuite": {
16+
"email": "[email protected]",
17+
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
18+
}
2019
}
2120
```

src/content/docs/cloudflare-one/api-terraform/access-api-examples/okta-group.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,19 @@
22
type: example
33
summary: Allow members of an Okta Group.
44
tags:
5-
- Okta® Group
6-
title: Okta® Group
5+
- Okta Group
6+
title: Okta Group
77
pcx_content_type: example
88
sidebar:
99
order: 4
1010
description: Allow members of an Okta Group.
11-
1211
---
1312

1413
```json
1514
{
16-
"okta": {
17-
"name": "admins",
18-
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
19-
}
15+
"okta": {
16+
"name": "admins",
17+
"identity_provider_id": "ca298b82-93b5-41bf-bc2d-10493f09b761"
18+
}
2019
}
2120
```

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/generic-saml-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Obtain the following URLs from your SaaS application account:
4545

4646
:::note[IdP groups]
4747

48-
If you are using Okta, AzureAD, Google Workspace, or GitHub as your IdP, Access will automatically send a SAML attribute titled `groups` with all of the user's associated groups as attribute values.
48+
If you are using Okta, Microsoft Entra ID (formerly Azure AD), Google Workspace, or GitHub as your IdP, Access will automatically send a SAML attribute titled `groups` with all of the user's associated groups as attribute values.
4949
:::
5050

5151
11. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ sidebar:
88
text: New
99
---
1010

11-
import { Badge, Details, Tabs, TabItem, Render } from "~/components"
11+
import { Badge, Details, Tabs, TabItem, Render } from "~/components";
1212

1313
Access for Infrastructure allows you to have granular control over how users access individual servers, clusters, or databases in your private network. By adding an infrastructure application to Cloudflare Access, you can configure how users authenticate to the resource as well as control and authorize the ports, protocols, and usernames that they can connect with. Access and command logs ensure regulatory compliance and allow for auditing of user activity in case of a security breach.
1414

@@ -37,13 +37,14 @@ Access for Infrastructure is available in early access and currently only suppor
3737
### Selectors
3838

3939
The following [Access policy selectors](/cloudflare-one/policies/access/#selectors) are available for securing infrastructure applications:
40+
4041
- Email
4142
- Emails ending in
4243
- SAML group
4344
- Country
4445
- Authentication method
4546
- Device posture
46-
- Azure group, GitHub organization, Google Workspace group, Okta group
47+
- Entra group, GitHub organization, Google Workspace group, Okta group
4748

4849
## 4. Configure the server
4950

@@ -63,8 +64,6 @@ To connect to targets that are in different VNETS, users will need to [switch th
6364
If a user is connected to a target in VNET-A and needs to connect to a target in VNET-B, switching their VNET will not break any existing connections to targets within VNET-A. At present, connections are maintained between VNETs.
6465
:::
6566

66-
6767
## Revoke a user's session
6868

6969
To revoke a user's access to all infrastructure targets, you can either [revoke the user from Zero Trust](/cloudflare-one/identity/users/session-management/#per-user) or revoke their device. Cloudflare does not currently support revoking a user's session for a specific target.
70-

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@ pcx_content_type: how-to
33
title: WARP sessions
44
sidebar:
55
order: 12
6-
76
---
87

9-
import { Render, Badge } from "~/components"
8+
import { Render, Badge } from "~/components";
109

1110
Cloudflare Zero Trust enforces WARP client reauthentication on a per-application basis, unlike legacy VPNs which treat it as a global setting. You can configure WARP session timeouts for your [Access applications](#configure-warp-sessions-in-access) or as part of your [Gateway policies](#configure-warp-sessions-in-gateway).
1211

@@ -52,10 +51,10 @@ If the user has an active browser session with the IdP, WARP will use the existi
5251

5352
### Supported IdPs
5453

55-
* [Azure AD](/cloudflare-one/identity/idp-integration/azuread/#force-user-interaction-during-warp-reauthentication)
54+
- [Microsoft Entra ID](/cloudflare-one/identity/idp-integration/entra-id/#force-user-interaction-during-warp-reauthentication)
5655

5756
## Limitations
5857

59-
* **Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).
60-
* **Active connections are not terminated** — Active sessions such as SSH and RDP will remain connected beyond the timeout limit.
61-
* **Binding Cookie is not supported** - WARP authentication will not work for Access applications that have the [Binding Cookie](/cloudflare-one/identity/authorization-cookie/#binding-cookie) enabled.
58+
- **Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).
59+
- **Active connections are not terminated** — Active sessions such as SSH and RDP will remain connected beyond the timeout limit.
60+
- **Binding Cookie is not supported** - WARP authentication will not work for Access applications that have the [Binding Cookie](/cloudflare-one/identity/authorization-cookie/#binding-cookie) enabled.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin.mdx

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,9 @@ pcx_content_type: how-to
33
title: Connect WARP before Windows login
44
sidebar:
55
order: 3
6-
76
---
87

9-
10-
import { Details, Render } from "~/components"
8+
import { Details, Render } from "~/components";
119

1210
<Details header="Feature availability">
1311

@@ -17,21 +15,20 @@ import { Details, Render } from "~/components"
1715

1816
| System | Availability | Minimum WARP version |
1917
| -------- | ------------ | -------------------- |
20-
| Windows || 2024.6.415.0 |
21-
| macOS || |
22-
| Linux || |
23-
| iOS || |
24-
| Android || |
25-
| ChromeOS || |
26-
18+
| Windows || 2024.6.415.0 |
19+
| macOS || |
20+
| Linux || |
21+
| iOS || |
22+
| Android || |
23+
| ChromeOS || |
2724

2825
</Details>
2926

3027
With Cloudflare Zero Trust, you can use an on-premise Active Directory (or similar) server to validate a remote user's Windows login credentials. Before the user enters their Windows login information for the first time, the WARP client establishes a connection using a service token. This initial connection is not associated with a user identity. Once the user completes the Windows login, WARP switches to an identity-based session and applies the user registration to all future logins.
3128

3229
## Prerequisites
3330

34-
* Active Directory resources are [connected to Cloudflare](/cloudflare-one/connections/connect-networks/private-net/).
31+
- Active Directory resources are [connected to Cloudflare](/cloudflare-one/connections/connect-networks/private-net/).
3532

3633
## 1. Create a service token
3734

@@ -49,18 +46,15 @@ In your [device enrollment permissions](/cloudflare-one/connections/connect-devi
4946

5047
Devices enrolled via a service token are identified by the email address `non_identity@<team-name>.cloudflareaccess.com`. Using this email address, you can apply specific [device profile settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and [Gateway network policies](/cloudflare-one/policies/gateway/network-policies/) during the pre-login state. For example, you could provide access to only those resources necessary to complete the Windows login and/or device management activities.
5148

52-
5349
<Details header="Example device profile rule">
5450

5551
| Selector | Operator | Value | Logic |
5652
| ---------------- | -------- | ----------------------------------------------- | ----- |
5753
| User email | in | `non_identity@<team-name>.cloudflareaccess.com` | And |
5854
| Operating system | is | Windows | |
5955

60-
6156
</Details>
6257

63-
6458
<Details header="Example Gateway network policy">
6559

6660
| Selector | Operator | Value | Logic |
@@ -73,7 +67,6 @@ Devices enrolled via a service token are identified by the email address `non_id
7367
| ------ |
7468
| Allow |
7569

76-
7770
</Details>
7871

7972
## 3. Configure the MDM file

0 commit comments

Comments
 (0)