Skip to content

Commit 7d034a4

Browse files
final edits
1 parent 98ba7c7 commit 7d034a4

File tree

1 file changed

+9
-9
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+9
-9
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To retrieve those values:
2929

3030
5. Select **Register an application to integrate with Microsoft Entra ID (App you're developing)**. If offered, do not select any of the gallery applications. Select **Create**.
3131

32-
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
32+
6. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
3333

3434
```txt
3535
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
@@ -39,23 +39,23 @@ To retrieve those values:
3939

4040
![Registering an application in Azure](~/assets/images/cloudflare-one/identity/azure/name-app.png)
4141

42-
8. Select **Register**.
42+
7. Select **Register**.
4343

44-
9. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
44+
8. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
4545

46-
10. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
46+
9. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
4747

4848
![Viewing the Application ID and Directory ID in Azure](~/assets/images/cloudflare-one/identity/azure/azure-values.png)
4949

50-
11. Under **Client credentials**, go to **Add a certificate or secret**. Select **New client secret**.
50+
10. Under **Client credentials**, go to **Add a certificate or secret**. Select **New client secret**.
5151

52-
12. Name the client secret and choose an expiration period.
52+
11. Name the client secret and choose an expiration period.
5353

5454
:::note
5555
When the client secret expires, users will be unable to log in through Access. Take note of your expiry date to prevent login errors and renew your client secret when necessary.
5656
:::
5757

58-
13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation. You will need this client secret value when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
58+
12. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation. You will need this client secret value when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
5959

6060
![Location of client secret in Azure](~/assets/images/cloudflare-one/identity/azure/client-cert-value.png)
6161

@@ -140,7 +140,7 @@ More narrow permissions may be used, however this is the set of permissions that
140140
</TabItem> <TabItem label="Terraform">
141141

142142
:::note[Provider versions]
143-
The following example requires Cloudflare provider version `>=4.40.0`.
143+
The following example requires Cloudflare provider version `4.40.0` or greater.
144144
:::
145145

146146
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
@@ -226,7 +226,7 @@ To check which users and groups were synchronized, select **Provisioning logs**.
226226

227227
<Render file="access/verify-scim-provisioning" />
228228

229-
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
229+
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go to [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
230230

231231
### Provisioning attributes
232232

0 commit comments

Comments
 (0)