Skip to content

Commit 9b41ec1

Browse files
committed
add scim link to named IdPs
1 parent 780676b commit 9b41ec1

File tree

7 files changed

+42
-26
lines changed

7 files changed

+42
-26
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/centrify-saml.mdx

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ pcx_content_type: how-to
33
title: Centrify (SAML)
44
---
55

6-
Centrify secures access to infrastructure, DevOps, cloud, and other modern enterprise so you can prevent the #1 cause of breaches privileged access abuse.
6+
Centrify secures access to infrastructure, DevOps, cloud, and other modern enterprise so you can prevent the number one cause of breaches: privileged access abuse.
77

8-
## Set up Centrify (SAML)
8+
## Set up Centrify as a SAML provider
99

10-
To set up SAML with Centrify as your identity provider:
10+
## 1. Create an application in Centrify
1111

1212
1. Log in to your **Centrify** admin portal and select **Apps**.
1313

@@ -59,15 +59,21 @@ To set up SAML with Centrify as your identity provider:
5959

6060
20. Select the **Manual Configuration** option.
6161

62-
21. In Zero Trust, go to **Settings** > **Authentication**.
62+
### 2. Add Centrify to Zero Trust
6363

64-
22. Under **Login methods**, select **Add new**.
64+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
6565

66-
23. Select SAML.
66+
2. Under **Login methods**, select **Add new**.
6767

68-
24. Copy and paste the corresponding information from Centrify into the fields.
68+
3. Select **SAML**.
6969

70-
25. Select **Save**.
70+
4. Copy and paste the corresponding information from Centrify into the fields.
71+
72+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-saml/#synchronize-users-and-groups).
73+
74+
6. (Optional) Under **Optional configurations**, configure [additional SAML options](/cloudflare-one/identity/idp-integration/generic-saml/#optional-configurations).
75+
76+
7. Select **Save**.
7177

7278
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
7379

src/content/docs/cloudflare-one/identity/idp-integration/centrify.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Centrify secures access to infrastructure, DevOps, cloud, and other modern enter
6464

6565
3. Paste in the **Client ID**, **Client Secret**, **Centrify account URL** and **Application ID**.
6666

67-
4. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
67+
4. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
6868

6969
5. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
7070

src/content/docs/cloudflare-one/identity/idp-integration/gsuite.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
7878

7979
4. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
8080

81-
5. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
81+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
8282

8383
6. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
8484

src/content/docs/cloudflare-one/identity/idp-integration/onelogin-oidc.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ OneLogin provides SSO identity management. Cloudflare Access supports OneLogin a
4848
- **Client secret**: Enter your OneLogin client secret.
4949
- **OneLogin account URL**: Enter your OneLogin domain, for example `https://<your-domain>.onelogin.com`.
5050

51-
5. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
51+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
5252

5353
6. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your Access [application token](/cloudflare-one/identity/authorization-cookie/application-token/).
5454

src/content/docs/cloudflare-one/identity/idp-integration/onelogin-saml.mdx

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ title: OneLogin (SAML)
55

66
OneLogin provides SSO identity management. Cloudflare Access supports OneLogin as an SAML identity provider.
77

8-
## Set up OneLogin (SAML)
8+
## Set up OneLogin as a SAML provider
99

10-
To set up OneLogin (SAML) as your identity provider:
10+
## 1. Create an application in OneLogin
1111

1212
1. Log in to your OneLogin admin portal.
1313

@@ -47,17 +47,21 @@ To set up OneLogin (SAML) as your identity provider:
4747

4848
![OneLogin SAML Application SSO interface with SAML2.0 sign on method, Issuer URL, and X.509 Certificate](~/assets/images/cloudflare-one/identity/onelogin/onelogin-saml-7.png)
4949

50-
15. In Zero Trust, go to **Settings** > **Authentication**.
50+
### 2. Add OneLogin to Zero Trust
5151

52-
16. Under **Login methods**, select **Add new**.
52+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
5353

54-
17. Select SAML.
54+
2. Under **Login methods**, select **Add new**.
5555

56-
18. Input the details from your OneLogin account in the fields. We suggest that you name the attributes the same in both OneLogin and Cloudflare.
56+
3. Select **SAML**.
5757

58-
If other headers and SAML attribute names were added to OneLogin, be sure to add them to Cloudflare under **SAML attributes** and **SAML header attributes** in the **Optional configurations** menu.
58+
4. Input the details from your OneLogin account in the fields.
5959

60-
19. Select **Save**.
60+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-saml/#synchronize-users-and-groups).
61+
62+
6. (Optional) Under **Optional configurations**, configure [additional SAML options](/cloudflare-one/identity/idp-integration/generic-saml/#optional-configurations). If you added other SAML headers and attribute names to OneLogin, be sure to add them to Cloudflare.
63+
64+
7. Select **Save**.
6165

6266
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
6367

src/content/docs/cloudflare-one/identity/idp-integration/pingone-oidc.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
3434
3. Select **PingOne**.
3535
4. Input the **Client ID**, **Client Secret**, and **Environment ID** generated previously.
3636
5. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
37-
6. (Optional) To enable SCIM, refer to the [OIDC connector documentation](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
37+
6. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-oidc/#synchronize-users-and-groups).
3838
7. (Optional) Under **Optional configurations**, enter [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#oidc-claims) that you wish to add to your users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
3939
8. Select **Save**.
4040

src/content/docs/cloudflare-one/identity/idp-integration/pingone-saml.mdx

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
99

1010
## Set up PingOne as a SAML provider
1111

12+
## 1. Create an application in PingOne
13+
1214
1. In your PingIdentity environment, go to **Connections** > **Applications**.
1315

1416
2. Select **Add Application**.
@@ -47,16 +49,20 @@ The PingOne cloud platform from PingIdentity provides SSO identity management. C
4749

4850
9. Set the application to **Active**.
4951

50-
10. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
52+
### 2. Add PingOne to Zero Trust
53+
54+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
55+
56+
2. Under **Login methods**, select **Add new**.
5157

52-
11. Under **Login methods**, select **Add new**.
58+
3. Select **SAML**.
5359

54-
12. Select **SAML**.
60+
4. Upload your PingOne XML metadata file.
5561

56-
13. Upload your PingOne XML metadata file from Step 7.
62+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](/cloudflare-one/identity/idp-integration/generic-saml/#synchronize-users-and-groups).
5763

58-
14. Enable [**Sign SAML authentication request**](/cloudflare-one/identity/idp-integration/generic-saml/#sign-saml-authentication-request).
64+
6. (Optional) Under **Optional configurations**, configure [additional SAML options](/cloudflare-one/identity/idp-integration/generic-saml/#optional-configurations).
5965

60-
15. Select **Save**.
66+
7. Select **Save**.
6167

6268
You can now [test your connection](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) and create [Access policies](/cloudflare-one/policies/access/) based on the configured login method and SAML attributes.

0 commit comments

Comments
 (0)