You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/centrify.mdx
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,8 @@ Centrify secures access to infrastructure, DevOps, cloud, and other modern enter
7
7
8
8
## Set up Centrify as an OIDC provider
9
9
10
+
### 1. Create an application in Centrify
11
+
10
12
1. Log in to the Centrify administrator panel.
11
13
12
14
2. Select **Apps**.
@@ -54,19 +56,23 @@ Centrify secures access to infrastructure, DevOps, cloud, and other modern enter
54
56
55
57
16. Select the roles to grant access to your application.
56
58
57
-
17. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
59
+
### 2. Add Centrify to Zero Trust
60
+
61
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
62
+
63
+
2. Under **Login methods**, select **Add new**.
58
64
59
-
18. Under **Login methods**, select **Add new**.
65
+
3. Paste in the **Client ID**, **Client Secret**, **Centrify account URL** and **Application ID**.
60
66
61
-
19. Paste in the **Client ID**, **Client Secret**, **Centrify account URL**and**Application ID**.
67
+
4. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
62
68
63
-
20. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
69
+
5. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
64
70
65
-
21. Select **Save**.
71
+
6. Select **Save**.
66
72
67
73
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
10. In [Zero Trust](https://one.dash.cloudflare.com),, go to **Settings** > **Authentication**.
36
+
### 2. Add OneLogin to Zero Trust
37
+
38
+
1. In [Zero Trust](https://one.dash.cloudflare.com),, go to **Settings** > **Authentication**.
35
39
36
-
11. Under **Login methods**, select **Add new**.
40
+
2. Under **Login methods**, select **Add new**.
37
41
38
-
12. Select **OneLogin**.
42
+
3. Select **OneLogin**.
39
43
40
-
13. Fill in the following information:
44
+
4. Fill in the following information:
41
45
42
46
-**Name**: Name your identity provider.
43
47
-**App ID**: Enter your OneLogin client ID.
44
48
-**Client secret**: Enter your OneLogin client secret.
45
49
-**OneLogin account URL**: Enter your OneLogin domain, for example `https://<your-domain>.onelogin.com`.
46
50
47
-
14. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
51
+
5. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
52
+
53
+
6. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
48
54
49
-
15. Select **Save**.
55
+
7. Select **Save**.
50
56
51
57
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to OneLogin.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/pingone-oidc.mdx
+13-7Lines changed: 13 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,8 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
7
7
8
8
## Set up PingOne as an OIDC provider
9
9
10
+
### 1. Create an application in PingOne
11
+
10
12
1. In your PingIdentity environment, go to **Connections** > **Applications**.
11
13
2. Select **Add Application**.
12
14
3. Enter an **Application Name**.
@@ -24,13 +26,17 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
24
26
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
25
27
26
28
10. Select **Save**.
27
-
11. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
28
-
12. Under **Login methods**, select **Add new**.
29
-
13. Select **PingOne**.
30
-
14. Input the **Client ID**, **Client Secret**, and **Environment ID** generated previously.
31
-
15. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
32
-
16. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
33
-
17. Select **Save**.
29
+
30
+
### 2. Add PingOne to Zero Trust
31
+
32
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
33
+
2. Under **Login methods**, select **Add new**.
34
+
3. Select **PingOne**.
35
+
4. Input the **Client ID**, **Client Secret**, and **Environment ID** generated previously.
36
+
5. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
37
+
6. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
38
+
7. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
39
+
8. Select **Save**.
34
40
35
41
You can now [test your connection](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) and create [Access policies](/cloudflare-one/policies/access/) based on the configured login method.
0 commit comments