Skip to content

Commit 95f7812

Browse files
authored
userName attribute (#25809)
1 parent f76e6a9 commit 95f7812

File tree

2 files changed

+17
-11
lines changed

2 files changed

+17
-11
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,8 @@ If not already configured, Cloudflare recommends enabling the following user att
235235

236236
| customappsso Attribute | Entra ID Attribute | Recommendation |
237237
| ------------------------------ | ------------------ | -------------- |
238-
| `emails[type eq "work"].value` | `mail` | Required |
238+
| `userName` | `userPrincipalName` or `mail` | Required. Must match the user's email address in Zero Trust. |
239+
| `emails[type eq "work"].value` | `mail` | Required. Must match the user's email address in Zero Trust. |
239240
| `name.givenName` | `givenName` | Recommended |
240241
| `name.familyName` | `surname` | Recommended |
241242

src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -118,30 +118,35 @@ If you would like to only maintain one Okta app instance, Okta does support SAML
118118

119119
5. On the **General Settings** tab, name your application and select **Next**.
120120

121-
6. On the **Sign-on Options** tab, ensure that **SAML 2.0** is selected. Select **Done** to create the integration.
121+
6. On the **Sign-on Options** tab, ensure that **SAML 2.0** is selected.
122122

123-
7. On the **Provisioning** tab, select **Configure API Integration**.
123+
7. Under **Credential Details**, set **Application username format** to either _Okta Username_ or _Email_. This value will be used for the SCIM `userName` attribute.
124+
:::note
125+
The `userName` attribute must match the user's email address in Zero Trust.
126+
:::
124127

125-
8. Select **Enable API integration**.
128+
8. Select **Done** to create the integration.
126129

127-
9. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
130+
9. On the **Provisioning** tab, select **Configure API Integration**.
128131

129-
10. In the **API Token** field, enter the **SCIM Secret** obtained from Zero Trust.
132+
10. Select **Enable API integration**.
133+
134+
11. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
135+
136+
12. In the **API Token** field, enter the **SCIM Secret** obtained from Zero Trust.
130137

131138
![Enter SCIM values into Okta](~/assets/images/cloudflare-one/identity/okta/enter-scim-values.png)
132139

133-
11. Select **Test API Credentials** to ensure that the credentials were entered correctly. Select **Save**.
140+
13. Select **Test API Credentials** to ensure that the credentials were entered correctly. Select **Save**.
134141

135-
12. On the **Provisioning** tab, select **Edit** and enable:
142+
14. On the **Provisioning** tab, select **Edit** and enable:
136143
- **Create Users**
137144
- **Update User Attributes**
138145
- **Deactivate Users**
139146

140147
![Configure provisioning settings in Okta](~/assets/images/cloudflare-one/identity/okta/enable-provisioning.png)
141148

142-
13. Select **Save** to complete the configuration.
143-
144-
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
149+
15. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
145150

146151
15. In the **Push Groups** tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder and are the group memberships that will be added and removed upon membership change in Okta.
147152

0 commit comments

Comments
 (0)