You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ To retrieve those values:
29
29
30
30
5. Select **Register an application to integrate with Microsoft Entra ID (App you're developing)**. If offered, do not select any of the gallery applications. Select **Create**.
31
31
32
-
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
32
+
6. Under **Redirect URI**, select the _Web_ platform and enter the following URL.

41
41
42
-
8. Select **Register**.
42
+
7. Select **Register**.
43
43
44
-
9. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
44
+
8. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
45
45
46
-
10. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
46
+
9. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
47
47
48
48

49
49
50
-
11. Under **Client credentials**, go to **Add a certificate or secret**. Select **New client secret**.
50
+
10. Under **Client credentials**, go to **Add a certificate or secret**. Select **New client secret**.
51
51
52
-
12. Name the client secret and choose an expiration period.
52
+
11. Name the client secret and choose an expiration period.
53
53
54
54
:::note
55
55
When the client secret expires, users will be unable to log in through Access. Take note of your expiry date to prevent login errors and renew your client secret when necessary.
56
56
:::
57
57
58
-
13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation. You will need this client secret value when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
58
+
12. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation. You will need this client secret value when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
59
59
60
60

61
61
@@ -140,7 +140,7 @@ More narrow permissions may be used, however this is the set of permissions that
140
140
</TabItem> <TabItemlabel="Terraform">
141
141
142
142
:::note[Provider versions]
143
-
The following example requires Cloudflare provider version `>=4.40.0`.
143
+
The following example requires Cloudflare provider version `4.40.0` or greater.
144
144
:::
145
145
146
146
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
@@ -226,7 +226,7 @@ To check which users and groups were synchronized, select **Provisioning logs**.
226
226
227
227
<Renderfile="access/verify-scim-provisioning" />
228
228
229
-
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
229
+
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go to [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
0 commit comments