Skip to content

Commit a3f3642

Browse files
committed
Additional feedback edits
1 parent bbdebeb commit a3f3642

File tree

4 files changed

+28
-25
lines changed

4 files changed

+28
-25
lines changed

src/content/docs/fundamentals/account/account-security/scim-setup/entra.mdx

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ sidebar:
55
label: Microsoft Entra
66
---
77

8+
import { Render } from "~/components";
9+
10+
<Render file="idp-group-deprecation" />
11+
812
## Set up the Enterprise application
913

1014
1. Go to your Microsoft Entra ID instance and select **Enterprise Applications**.
@@ -146,15 +150,3 @@ After completing the tasks above, the next steps in Entra include:
146150
- Additional group/provisioning configuration
147151
- Test and save after updating the config.
148152
- Provisioning after configuration is complete
149-
150-
## Expected behaviors
151-
152-
Expectations for user lifecycle management with SCIM:
153-
154-
| Expected Cloudflare dash behavior | Identity provider action |
155-
| ---------------------------------------------- |-------------------------------|
156-
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
157-
| User is removed from account as member | Unassign the user from the SCIM application. |
158-
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
159-
| Remove role from user | Remove the user from the corresponding group in the IdP. |
160-
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |

src/content/docs/fundamentals/account/account-security/scim-setup/index.mdx

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
pcx_content_type: how-to
33
title: SCIM provisioning
4-
updated: 2024-12-04
54

65
---
76

@@ -11,6 +10,18 @@ Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by
1110
This section covers SCIM provisioning for the Cloudflare dashboard only. If you need to provision SCIM for Cloudflare Zero Trust, refer to [Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim/).
1211
:::
1312

13+
## Expected behaviors
14+
15+
Expectations for user lifecycle management with SCIM:
16+
17+
| Expected Cloudflare dash behavior | Identity provider action |
18+
| --------------------------------- | ------------------------- |
19+
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
20+
| User is removed from account as member | Unassign the user from the SCIM application. |
21+
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
22+
| Remove role from user | Remove the user from the corresponding group in the IdP. |
23+
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |
24+
1425
## Limitations
1526

1627
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
@@ -49,15 +60,3 @@ To start, you will need to collect a couple of pieces of data from Cloudflare an
4960
3. Select **Continue to summary**.
5061
4. Validate the permissions and select **Create Token**.
5162
5. Copy the token value.
52-
53-
## Expected behaviors
54-
55-
Expectations for user lifecycle management with SCIM:
56-
57-
| Expected Cloudflare dash behavior | Identity provider action |
58-
| --------------------------------- | ------------------------- |
59-
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
60-
| User is removed from account as member | Unassign the user from the SCIM application. |
61-
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
62-
| Remove role from user | Remove the user from the corresponding group in the IdP. |
63-
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |

src/content/docs/fundamentals/account/account-security/scim-setup/okta.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ sidebar:
55
label: Okta
66
---
77

8+
import { Render } from "~/components";
9+
10+
<Render file="idp-group-deprecation" />
11+
812
## Set up your Okta SCIM application
913

1014
1. In the Okta dashboard, go to **Applications** > **Applications**.
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
{}
3+
4+
---
5+
6+
:::note
7+
**Important Update:** Cloudflare now supports native User Groups for enhanced access control. This new feature replaces the previous method of directly assigning Cloudflare roles based on IdP group mappings, which is deprecated as of June 2nd, 2025. Update your SCIM configurations using the instructions below to utilize User Groups for seamless provisioning.
8+
:::

0 commit comments

Comments
 (0)