Skip to content

Commit 85bd102

Browse files
[CF1] generic saml cert expiration
1 parent 344db2b commit 85bd102

File tree

1 file changed

+31
-27
lines changed

1 file changed

+31
-27
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx

Lines changed: 31 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 2
66
---
77

8-
import { Tabs, TabItem, Render } from '~/components';
8+
import { Tabs, TabItem, Render } from "~/components";
99

1010
Cloudflare Zero Trust integrates with any identity provider that supports SAML 2.0. If your identity provider is not listed in the integration list of login methods in Zero Trust, it can be configured using SAML 2.0 (or OpenID if OIDC based). Generic SAML can also be used if you would like to pass additional SAML headers or claims for an IdP in the integration list.
1111

@@ -43,7 +43,6 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web
4343

4444
## 2. Add a SAML identity provider to Zero Trust
4545

46-
4746
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
4847

4948
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication** > **Login methods**.
@@ -60,28 +59,36 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web
6059
The following example requires Cloudflare provider version `>=4.40.0`.
6160
:::
6261

63-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
64-
- `Access: Organizations, Identity Providers, and Groups Write`
65-
66-
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
67-
68-
```tf
69-
resource "cloudflare_zero_trust_access_identity_provider" "generic_saml_example" {
70-
account_id = var.cloudflare_account_id
71-
name = "Generic SAML example"
72-
type = "saml"
73-
config {
74-
sso_target_url = "https://example.com/1234/sso/saml"
75-
issuer_url = "https://example.com/1234"
76-
idp_public_cert = "-----BEGIN CERTIFICATE-----\nXXXXX\n-----END CERTIFICATE-----"
77-
sign_request = false
78-
email_attribute_name = "email"
79-
attributes = ["employeeID", "groups"]
80-
}
81-
}
82-
```
62+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
63+
64+
- `Access: Organizations, Identity Providers, and Groups Write`
65+
66+
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
67+
68+
```tf
69+
resource "cloudflare_zero_trust_access_identity_provider" "generic_saml_example" {
70+
account_id = var.cloudflare_account_id
71+
name = "Generic SAML example"
72+
type = "saml"
73+
config {
74+
sso_target_url = "https://example.com/1234/sso/saml"
75+
issuer_url = "https://example.com/1234"
76+
idp_public_cert = "-----BEGIN CERTIFICATE-----\nXXXXX\n-----END CERTIFICATE-----"
77+
sign_request = false
78+
email_attribute_name = "email"
79+
attributes = ["employeeID", "groups"]
80+
}
81+
}
82+
```
83+
8384
</TabItem> </Tabs>
8485

86+
:::caution
87+
88+
Set a reminder noting when the signing certificate obtained from your generic SAML identity provider will expire. After the certificate expires, you will need to generate a new signing certificate and re-add it to your Cloudflare configuration via the Cloudflare dashboard or Terraform.
89+
90+
:::
91+
8592
## 3. Test the connection
8693

8794
You can now [test the IdP integration](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust). A success response should return the configured SAML attributes.
@@ -96,10 +103,7 @@ Your identity provider must support SCIM version 2.0.
96103

97104
### 1. Enable SCIM in Zero Trust
98105

99-
<Render
100-
file="access/enable-scim-on-dashboard"
101-
params={{ idp: "IdP"}}
102-
/>
106+
<Render file="access/enable-scim-on-dashboard" params={{ idp: "IdP" }} />
103107

104108
### 2. Configure SCIM in the IdP
105109

@@ -114,7 +118,7 @@ If you would like to build policies based on IdP groups:
114118

115119
### 3. Verify SCIM provisioning
116120

117-
<Render file="access/verify-scim-provisioning"/>
121+
<Render file="access/verify-scim-provisioning" />
118122

119123
## Optional configurations
120124

0 commit comments

Comments
 (0)