You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx
+15-10Lines changed: 15 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,30 +118,35 @@ If you would like to only maintain one Okta app instance, Okta does support SAML
118
118
119
119
5. On the **General Settings** tab, name your application and select **Next**.
120
120
121
-
6. On the **Sign-on Options** tab, ensure that **SAML 2.0** is selected. Select **Done** to create the integration.
121
+
6. On the **Sign-on Options** tab, ensure that **SAML 2.0** is selected.
122
122
123
-
7. On the **Provisioning** tab, select **Configure API Integration**.
123
+
7. Under **Credential Details**, set **Application username format** to either _Okta Username_ or _Email_. This value will be used for the SCIM `userName` attribute.
124
+
:::note
125
+
The `userName` attribute must match the user's email address in Zero Trust.
126
+
:::
124
127
125
-
8. Select **Enable API integration**.
128
+
8. Select **Done** to create the integration.
126
129
127
-
9.In the **Base URL**field, enter the **SCIM Endpoint** obtained from Zero Trust.
130
+
9.On the **Provisioning**tab, select **Configure API Integration**.
128
131
129
-
10. In the **API Token** field, enter the **SCIM Secret** obtained from Zero Trust.
132
+
10. Select **Enable API integration**.
133
+
134
+
11. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
135
+
136
+
12. In the **API Token** field, enter the **SCIM Secret** obtained from Zero Trust.
130
137
131
138

132
139
133
-
11. Select **Test API Credentials** to ensure that the credentials were entered correctly. Select **Save**.
140
+
13. Select **Test API Credentials** to ensure that the credentials were entered correctly. Select **Save**.
134
141
135
-
12. On the **Provisioning** tab, select **Edit** and enable:
142
+
14. On the **Provisioning** tab, select **Edit** and enable:
136
143
-**Create Users**
137
144
-**Update User Attributes**
138
145
-**Deactivate Users**
139
146
140
147

141
148
142
-
13. Select **Save** to complete the configuration.
143
-
144
-
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
149
+
15. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
145
150
146
151
15. In the **Push Groups** tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder and are the group memberships that will be added and removed upon membership change in Okta.
0 commit comments