Skip to content

Commit a45c781

Browse files
[CF1] adding okta docs on claims
1 parent 2c87be7 commit a45c781

File tree

1 file changed

+7
-10
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+7
-10
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Additionally, you can configure Okta to use risk information from Zero Trust [us
4040
9. Set the **Groups claim filter** to _Matches regex_ and its value to `.*`.
4141

4242
:::note
43-
Groups managed outside of Okta (for example, Microsoft Entra ID or Google groups) may require different regex values. For more information, refer to the [Okta documentation](https://support.okta.com/help/s/article/Why-isnt-my-Groups-claim-returning-Active-Directory-groups).
43+
Groups managed outside of Okta (for example, Microsoft Entra ID or Google groups) may require different regex values. For more information, refer to the Okta documentation on [Groups Claims](https://support.okta.com/help/s/article/Why-isnt-my-Groups-claim-returning-Active-Directory-groups) and [OpenID Connect Claims](https://support.okta.com/help/s/article/Can-we-retrieve-both-Active-Directory-and-Okta-groups-in-OpenID-Connect-claims?language=en_US).
4444
:::
4545

4646
10. In the **General** tab, copy the **Client ID** and **Client secret**.
@@ -94,10 +94,7 @@ If you would like to only maintain one Okta app instance, Okta does support SAML
9494

9595
### 1. Enable SCIM in Zero Trust
9696

97-
<Render
98-
file="access/enable-scim-on-dashboard"
99-
params={{ idp: "Okta"}}
100-
/>
97+
<Render file="access/enable-scim-on-dashboard" params={{ idp: "Okta" }} />
10198

10299
### 2. Configure SCIM in Okta
103100

@@ -135,17 +132,17 @@ If you would like to only maintain one Okta app instance, Okta does support SAML
135132

136133
13. Select **Save** to complete the configuration.
137134

138-
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
135+
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
139136

140137
15. In the **Push Groups** tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder and are the group memberships that will be added and removed upon membership change in Okta.
141138

142-
:::note
143-
Groups in this SCIM app Push Groups integration should match the groups in your base [OIDC app integration](/cloudflare-one/identity/idp-integration/okta/#set-up-okta-as-an-oidc-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
144-
:::
139+
:::note
140+
Groups in this SCIM app Push Groups integration should match the groups in your base [OIDC app integration](/cloudflare-one/identity/idp-integration/okta/#set-up-okta-as-an-oidc-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
141+
:::
145142

146143
To verify the integration, select **View Logs** in the Okta SCIM application.
147144

148-
<Render file="access/verify-scim-provisioning"/>
145+
<Render file="access/verify-scim-provisioning" />
149146

150147
## Example API Configuration
151148

0 commit comments

Comments
 (0)