Skip to content

Commit 7859de1

Browse files
deadlypants1973jonesphillip
authored andcommitted
[CF1] client secret expiry (#19913)
1 parent 3a8ca64 commit 7859de1

File tree

1 file changed

+43
-36
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+43
-36
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 43 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,12 @@ To retrieve those values:
5353

5454
12. Name the client secret and choose an expiration period.
5555

56+
:::note
57+
58+
When the client secret expires, users will be unable to log in through Access. Take note of your expiry date to prevent login errors and renew your client secret when necessary.
59+
60+
:::
61+
5662
13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation.
5763

5864
![Location of client secret in Azure](~/assets/images/cloudflare-one/identity/azure/client-cert-value.png)
@@ -120,7 +126,7 @@ The Microsoft Entra ID integration allows you to synchronize IdP groups and auto
120126

121127
<Render
122128
file="access/enable-scim-on-dashboard"
123-
params={{ idp: "Entra ID", and: " and ", supportgroups: "Support groups"}}
129+
params={{ idp: "Entra ID", and: " and ", supportgroups: "Support groups" }}
124130
/>
125131

126132
### 2. Configure SCIM in Entra ID
@@ -139,9 +145,9 @@ SCIM requires a separate enterprise application from the one created during [ini
139145

140146
5. Once the SCIM application is created, [assign users and groups to the application](https://learn.microsoft.com/entra/identity/enterprise-apps/assign-user-or-group-access-portal).
141147

142-
:::note
143-
Groups in this SCIM application should match the groups in your other [Cloudflare Access enterprise application](/cloudflare-one/identity/idp-integration/entra-id/#set-up-entra-id-as-an-identity-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
144-
:::
148+
:::note
149+
Groups in this SCIM application should match the groups in your other [Cloudflare Access enterprise application](/cloudflare-one/identity/idp-integration/entra-id/#set-up-entra-id-as-an-identity-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
150+
:::
145151

146152
6. Go to **Provisioning** and select **Get started**.
147153

@@ -159,7 +165,7 @@ SCIM requires a separate enterprise application from the one created during [ini
159165

160166
To check which users and groups were synchronized, select **View provisioning logs**.
161167

162-
<Render file="access/verify-scim-provisioning"/>
168+
<Render file="access/verify-scim-provisioning" />
163169

164170
### Provisioning attributes
165171

@@ -207,38 +213,39 @@ Access and Gateway policies for an Entra group will also apply to all [nested gr
207213
## Force user interaction during WARP reauthentication
208214

209215
You can require users to re-enter their credentials into Entra ID whenever they [re-authenticate their WARP session](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). To configure this setting:
216+
210217
1. Make a `GET` request to the [Identity Providers endpoint](/api/resources/zero_trust/subresources/identity_providers/) and copy the response for the Entra ID identity provider.
211218
2. [Update the Entra ID identity provider](/api/resources/zero_trust/subresources/identity_providers/methods/update/) using a `PUT` request. In the request body, include all existing configurations and set the `prompt` parameter to either `login` or `select_account`. For example,
212-
```sh {17}
213-
curl --request PUT \
214-
https://api.cloudflare.com/client/v4/accounts/{account_id}/access/identity_providers/{identity_provider_id} \
215-
--header "Authorization: Bearer <API_TOKEN>" \
216-
--header "Content-Type: application/json" \
217-
--data '{
218-
"id": "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
219-
"type": "azureAD",
220-
"uid": "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
221-
"name": "Entra ID",
222-
"version": "31e74e9b4f033e16b604552091a72295",
223-
"config": {
224-
"azure_cloud": "default",
225-
"client_id": "<CLIENT_ID>",
226-
"conditional_access_enabled": false,
227-
"directory_id": "<AZURE_DIRECTORY_ID>",
228-
"redirect_url": "https://<TEAM_NAME>.cloudflareaccess.com/cdn-cgi/access/callback",
229-
"prompt": "login",
230-
"support_groups": true
231-
},
232-
"scim_config": {
233-
"enabled": true,
234-
"user_deprovision": true,
235-
"seat_deprovision": false,
236-
"group_member_deprovision": false,
237-
"identity_update_behavior": "automatic"
238-
},
239-
"scim_base_url": "https://<TEAM_NAME>.cloudflareaccess.com/populations/f174e90a-fafe-4643-bbbc-4a0ed4fc8415/scim/v2"
240-
}'
241-
```
219+
```sh {17}
220+
curl --request PUT \
221+
https://api.cloudflare.com/client/v4/accounts/{account_id}/access/identity_providers/{identity_provider_id} \
222+
--header "Authorization: Bearer <API_TOKEN>" \
223+
--header "Content-Type: application/json" \
224+
--data '{
225+
"id": "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
226+
"type": "azureAD",
227+
"uid": "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
228+
"name": "Entra ID",
229+
"version": "31e74e9b4f033e16b604552091a72295",
230+
"config": {
231+
"azure_cloud": "default",
232+
"client_id": "<CLIENT_ID>",
233+
"conditional_access_enabled": false,
234+
"directory_id": "<AZURE_DIRECTORY_ID>",
235+
"redirect_url": "https://<TEAM_NAME>.cloudflareaccess.com/cdn-cgi/access/callback",
236+
"prompt": "login",
237+
"support_groups": true
238+
},
239+
"scim_config": {
240+
"enabled": true,
241+
"user_deprovision": true,
242+
"seat_deprovision": false,
243+
"group_member_deprovision": false,
244+
"identity_update_behavior": "automatic"
245+
},
246+
"scim_base_url": "https://<TEAM_NAME>.cloudflareaccess.com/populations/f174e90a-fafe-4643-bbbc-4a0ed4fc8415/scim/v2"
247+
}'
248+
```
242249

243250
## Example API Configuration
244251

@@ -253,4 +260,4 @@ You can require users to re-enter their credentials into Entra ID whenever they
253260
"type": "azureAD",
254261
"name": "my example idp"
255262
}
256-
```
263+
```

0 commit comments

Comments
 (0)