You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
157
-
| User is removed from account as member | Unassign the user from the SCIM application. |
158
-
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
159
-
| Remove role from user | Remove the user from the corresponding group in the IdP. |
160
-
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |
Copy file name to clipboardExpand all lines: src/content/docs/fundamentals/account/account-security/scim-setup/index.mdx
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
1
---
2
2
pcx_content_type: how-to
3
3
title: SCIM provisioning
4
-
updated: 2024-12-04
5
4
6
5
---
7
6
@@ -11,6 +10,18 @@ Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by
11
10
This section covers SCIM provisioning for the Cloudflare dashboard only. If you need to provision SCIM for Cloudflare Zero Trust, refer to [Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim/).
12
11
:::
13
12
13
+
## Expected behaviors
14
+
15
+
Expectations for user lifecycle management with SCIM:
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
20
+
| User is removed from account as member | Unassign the user from the SCIM application. |
21
+
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
22
+
| Remove role from user | Remove the user from the corresponding group in the IdP. |
23
+
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |
24
+
14
25
## Limitations
15
26
16
27
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
@@ -49,15 +60,3 @@ To start, you will need to collect a couple of pieces of data from Cloudflare an
49
60
3. Select **Continue to summary**.
50
61
4. Validate the permissions and select **Create Token**.
51
62
5. Copy the token value.
52
-
53
-
## Expected behaviors
54
-
55
-
Expectations for user lifecycle management with SCIM:
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
60
-
| User is removed from account as member | Unassign the user from the SCIM application. |
61
-
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
62
-
| Remove role from user | Remove the user from the corresponding group in the IdP. |
63
-
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |
**Important Update:** Cloudflare now supports native User Groups for enhanced access control. This new feature replaces the previous method of directly assigning Cloudflare roles based on IdP group mappings, which is deprecated as of June 2nd, 2025. Update your SCIM configurations using the instructions below to utilize User Groups for seamless provisioning.
0 commit comments