Skip to content

Commit 780676b

Browse files
committed
add scim link to oidc idps
1 parent 11b8c9d commit 780676b

File tree

3 files changed

+37
-19
lines changed

3 files changed

+37
-19
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/centrify.mdx

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ Centrify secures access to infrastructure, DevOps, cloud, and other modern enter
77

88
## Set up Centrify as an OIDC provider
99

10+
### 1. Create an application in Centrify
11+
1012
1. Log in to the Centrify administrator panel.
1113

1214
2. Select **Apps**.
@@ -54,19 +56,23 @@ Centrify secures access to infrastructure, DevOps, cloud, and other modern enter
5456

5557
16. Select the roles to grant access to your application.
5658

57-
17. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
59+
### 2. Add Centrify to Zero Trust
60+
61+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
62+
63+
2. Under **Login methods**, select **Add new**.
5864

59-
18. Under **Login methods**, select **Add new**.
65+
3. Paste in the **Client ID**, **Client Secret**, **Centrify account URL** and **Application ID**.
6066

61-
19. Paste in the **Client ID**, **Client Secret**, **Centrify account URL** and **Application ID**.
67+
4. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
6268

63-
20. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
69+
5. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
6470

65-
21. Select **Save**.
71+
6. Select **Save**.
6672

6773
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
6874

69-
## **Example API Config**
75+
## Example API Config
7076

7177
```json
7278
{

src/content/docs/cloudflare-one/identity/idp-integration/onelogin-oidc.mdx

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ OneLogin provides SSO identity management. Cloudflare Access supports OneLogin a
77

88
## Set up OneLogin as an OIDC provider
99

10+
### 1. Create an application in OneLogin
11+
1012
1. Log in to your OneLogin admin portal.
1113

1214
2. Go to **Applications** > **Applications** and select **Add App**.
@@ -31,22 +33,26 @@ OneLogin provides SSO identity management. Cloudflare Access supports OneLogin a
3133

3234
9. Copy the **Client ID** and **Client Secret**.
3335

34-
10. In [Zero Trust](https://one.dash.cloudflare.com),, go to **Settings** > **Authentication**.
36+
### 2. Add OneLogin to Zero Trust
37+
38+
1. In [Zero Trust](https://one.dash.cloudflare.com),, go to **Settings** > **Authentication**.
3539

36-
11. Under **Login methods**, select **Add new**.
40+
2. Under **Login methods**, select **Add new**.
3741

38-
12. Select **OneLogin**.
42+
3. Select **OneLogin**.
3943

40-
13. Fill in the following information:
44+
4. Fill in the following information:
4145

4246
- **Name**: Name your identity provider.
4347
- **App ID**: Enter your OneLogin client ID.
4448
- **Client secret**: Enter your OneLogin client secret.
4549
- **OneLogin account URL**: Enter your OneLogin domain, for example `https://<your-domain>.onelogin.com`.
4650

47-
14. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
51+
5. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
52+
53+
6. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
4854

49-
15. Select **Save**.
55+
7. Select **Save**.
5056

5157
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to OneLogin.
5258

src/content/docs/cloudflare-one/identity/idp-integration/pingone-oidc.mdx

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
77

88
## Set up PingOne as an OIDC provider
99

10+
### 1. Create an application in PingOne
11+
1012
1. In your PingIdentity environment, go to **Connections** > **Applications**.
1113
2. Select **Add Application**.
1214
3. Enter an **Application Name**.
@@ -24,13 +26,17 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
2426
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
2527

2628
10. Select **Save**.
27-
11. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
28-
12. Under **Login methods**, select **Add new**.
29-
13. Select **PingOne**.
30-
14. Input the **Client ID**, **Client Secret**, and **Environment ID** generated previously.
31-
15. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
32-
16. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
33-
17. Select **Save**.
29+
30+
### 2. Add PingOne to Zero Trust
31+
32+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
33+
2. Under **Login methods**, select **Add new**.
34+
3. Select **PingOne**.
35+
4. Input the **Client ID**, **Client Secret**, and **Environment ID** generated previously.
36+
5. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
37+
6. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
38+
7. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
39+
8. Select **Save**.
3440

3541
You can now [test your connection](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) and create [Access policies](/cloudflare-one/policies/access/) based on the configured login method.
3642

0 commit comments

Comments
 (0)