Skip to content

Commit b263b64

Browse files
authored
[ZT] Post-migration cleanup (#16405)
1 parent a0d0ff0 commit b263b64

File tree

51 files changed

+505
-580
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+505
-580
lines changed

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/docusign-access.mdx

Lines changed: 26 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,15 @@ title: DocuSign
44
updated: 2024-06-18
55
sidebar:
66
order: 10
7-
87
---
98

10-
This guide covers how to configure [Docusign](https://support.docusign.com/s/document-item?language=en_US\&bundleId=rrf1583359212854\&topicId=ozd1583359139126.html&_LANG=enus) as a SAML application in Cloudflare Zero Trust.
9+
This guide covers how to configure [Docusign](https://support.docusign.com/s/document-item?bundleId=rrf1583359212854&topicId=ozd1583359139126.html) as a SAML application in Cloudflare Zero Trust.
1110

1211
## Prerequisites
1312

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
15-
* Admin access to a Docusign account that has Single Sign-On available
16-
* A [domain](https://support.docusign.com/s/document-item?language=en_US\&bundleId=rrf1583359212854\&topicId=gso1583359141256.html&_LANG=enus) verified in Docusign
13+
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
- Admin access to a Docusign account that has Single Sign-On available
15+
- A [domain](https://support.docusign.com/s/document-item?bundleId=rrf1583359212854&topicId=gso1583359141256.html) verified in Docusign
1716

1817
## 1. Create the Access for SaaS application
1918

@@ -25,26 +24,26 @@ This guide covers how to configure [Docusign](https://support.docusign.com/s/doc
2524

2625
4. Use the following configuration:
2726

28-
* Set the **Application** to *DocuSign*.
29-
* Put placeholder values in **EntityID** and **Assertion Consumer Service URL** (e.g. `https://example.com`). Well come back and update these.
30-
* Set **Name ID Format** to: *Unique ID*.
27+
- Set the **Application** to _DocuSign_.
28+
- Put placeholder values in **EntityID** and **Assertion Consumer Service URL** (e.g. `https://example.com`). We'll come back and update these.
29+
- Set **Name ID Format** to: _Unique ID_.
3130

3231
5. DocuSign requires SAML attributes to do Just In Time user provisioning. Ensure you are collecting SAML attributes from your IdP:
3332

34-
* Group
35-
* username
36-
* department
37-
* firstName
38-
* lastName
39-
* phone
33+
- Group
34+
- username
35+
- department
36+
- firstName
37+
- lastName
38+
- phone
4039

4140
6. These IdP SAML values can then be mapped to the following DocuSign SAML attributes:
4241

43-
* Email
44-
* Surname
45-
* Givenname
42+
- Email
43+
- Surname
44+
- Givenname
4645

47-
7. Set an Access policy (for example, create a policy based on *Emails ending in @example.com*).
46+
7. Set an Access policy (for example, create a policy based on _Emails ending in @example.com_).
4847

4948
8. Copy and save SSO Endpoint, Entity ID and Public Key.
5049

@@ -58,7 +57,7 @@ This guide covers how to configure [Docusign](https://support.docusign.com/s/doc
5857

5958
11. Wrap the value in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
6059

61-
12. Set the file extension to `.crt` and save.
60+
12. Set the file extension to `.crt` and save.
6261
:::
6362

6463
## 2. Configure your DocuSign SSO instance
@@ -69,27 +68,27 @@ This guide covers how to configure [Docusign](https://support.docusign.com/s/doc
6968

7069
3. On the Identity Providers page, select **ADD IDENTITY PROVIDER**. Use the following mappings from the saved Access Application values:
7170

72-
* **Name**: Pick your desired name.
73-
* **Identity Provider Issuer**: Entity ID.
74-
* **Identity Provider Login URL**: Assertion Consumer Service URL.
71+
- **Name**: Pick your desired name.
72+
- **Identity Provider Issuer**: Entity ID.
73+
- **Identity Provider Login URL**: Assertion Consumer Service URL.
7574

7675
4. Save the Identity Provider.
7776

78-
5. Upload your certificate to the *DocuSign Identity Provider* menu.
77+
5. Upload your certificate to the _DocuSign Identity Provider_ menu.
7978

8079
6. Configure your SAML Attribute mappings. The Attribute Names should match the values in **IdP Value** in your Access application.
8180

8281
7. Go back to the Identity Provider's screen and select **Actions** > **Endpoints**. Copy and save the following:
83-
* Service Provider Issuer URL.
84-
* Service Provider Assertion Consumer Service URL.
82+
- Service Provider Issuer URL.
83+
- Service Provider Assertion Consumer Service URL.
8584

8685
## 3. Finalize your Cloudflare configuration
8786

8887
1. Go back to your DocuSign application under **Access** > **Applications**.
8988
2. Select **Edit**.
9089
3. Use the following mappings:
91-
* EntityID->Service Provider Issuer URL.
92-
* Assertion Consumer Service URL -> Service Provider Assertion Consumer Service URL.
90+
- EntityID->Service Provider Issuer URL.
91+
- Assertion Consumer Service URL -> Service Provider Assertion Consumer Service URL.
9392
4. Save the application.
9493

9594
When ready, enable the SSO for your DocuSign account and you will be able to login to DocuSign via Cloudflare SSO and your Identity Provider.

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/generic-saml-saas.mdx

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,24 +3,23 @@ pcx_content_type: how-to
33
title: Generic SAML application
44
sidebar:
55
order: 1
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
This page provides generic instructions for setting up a SaaS application in Cloudflare Access using the SAML authentication protocol.
1211

1312
## Prerequisites
1413

15-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
16-
* Admin access to the account of the SaaS application
14+
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
15+
- Admin access to the account of the SaaS application
1716

1817
## 1. Get SaaS application URLs
1918

2019
Obtain the following URLs from your SaaS application account:
2120

22-
* **Entity ID**: A unique URL issued for your SaaS application, for example `https://<your-domain>.my.salesforce.com`.
23-
* **Assertion Consumer Service URL**: The service provider's endpoint for receiving and parsing SAML assertions.
21+
- **Entity ID**: A unique URL issued for your SaaS application, for example `https://<your-domain>.my.salesforce.com`.
22+
- **Assertion Consumer Service URL**: The service provider's endpoint for receiving and parsing SAML assertions.
2423

2524
## 2. Add your application to Access
2625

@@ -38,15 +37,15 @@ Obtain the following URLs from your SaaS application account:
3837

3938
7. Enter the **Entity ID** and **Assertion Consumer Service URL** obtained from your SaaS application account.
4039

41-
8. Select the **Name ID Format** expected by your SaaS application (usually *Email*).
40+
8. Select the **Name ID Format** expected by your SaaS application (usually _Email_).
4241

4342
9. Copy the **SSO endpoint**, **Access Entity ID or Issuer**, and **Public key**.
4443

45-
10. If your SaaS application requires additional **SAML attribute statements**, add the mapping of your IdPs attributes you would like to include in the SAML statement sent to the SaaS application.
44+
10. If your SaaS application requires additional **SAML attribute statements**, add the mapping of your IdP's attributes you would like to include in the SAML statement sent to the SaaS application.
4645

4746
:::note[IdP groups]
4847

49-
If you are using Okta, AzureAD, Google Workspace, or GitHub as your IdP, Access will automatically send a SAML attribute titled `groups` with all of the user's associated groups as attribute values.
48+
If you are using Okta, AzureAD, Google Workspace, or GitHub as your IdP, Access will automatically send a SAML attribute titled `groups` with all of the user's associated groups as attribute values.
5049
:::
5150

5251
11. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.
@@ -67,9 +66,9 @@ If you are using Okta, AzureAD, Google Workspace, or GitHub as your IdP, Access
6766

6867
Next, configure your SaaS application to require users to log in through Cloudflare Access. Refer to your SaaS application documentation for instructions on how to configure a third-party SAML SSO provider. You will need the following values from the Zero Trust dashboard:
6968

70-
* **SSO endpoint**
71-
* **Access Entity ID or Issuer**
72-
* **Public key**
69+
- **SSO endpoint**
70+
- **Access Entity ID or Issuer**
71+
- **Public key**
7372

7473
You can either manually enter this data into your SaaS application or upload a metadata XML file. The metadata is available at the URL: `<SSO endpoint>/saml-metadata`.
7574

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/google-cloud-saas.mdx

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,39 +4,38 @@ title: Google Cloud
44
updated: 2024-07-03
55
sidebar:
66
order: 13
7-
87
---
98

10-
import { GlossaryTooltip } from "~/components"
9+
import { GlossaryTooltip } from "~/components";
1110

1211
This guide covers how to configure [Google Cloud](https://support.google.com/cloudidentity/topic/7558767) as a SAML application in Cloudflare Zero Trust.
1312

1413
:::caution
1514

1615
When configuring Google Cloud with Access, the following limitations apply:
1716

18-
* Users will not be able to log in using [Google](/cloudflare-one/identity/idp-integration/google/) or [Google Workspace](/cloudflare-one/identity/idp-integration/gsuite/) as an identity provider after Google Cloud is configured with Access.
17+
- Users will not be able to log in using [Google](/cloudflare-one/identity/idp-integration/google/) or [Google Workspace](/cloudflare-one/identity/idp-integration/gsuite/) as an identity provider after Google Cloud is configured with Access.
1918

20-
* The integration of Access as a single sign-on provider for your Google Cloud account does not work for Google super admins. It will work for other users.
19+
- The integration of Access as a single sign-on provider for your Google Cloud account does not work for Google super admins. It will work for other users.
2120
:::
2221

2322
## Prerequistes
2423

25-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
26-
* Admin access to a Google Workspace account
27-
* [Cloud Identity Free or Premium](https://support.google.com/cloudidentity/answer/7389973) set up in your organization's Google Cloud account
24+
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
25+
- Admin access to a Google Workspace account
26+
- [Cloud Identity Free or Premium](https://support.google.com/cloudidentity/answer/7389973) set up in your organization's Google Cloud account
2827

2928
## 1. Add a SaaS application to Cloudflare Zero Trust
3029

3130
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
3231
2. Select **Add an application** > **SaaS** > **Select**.
33-
3. For **Application**, select *Google Cloud*.
32+
3. For **Application**, select _Google Cloud_.
3433
4. For the authentication protocol, select **SAML**.
3534
5. Select **Add application**.
3635
6. Fill in the following fields:
37-
* **Entity ID**: `google.com`
38-
* **Assertion Consumer Service URL**: `https://www.google.com/a/<your_domain.com>/acs`
39-
* **Name ID format**: *Email*
36+
- **Entity ID**: `google.com`
37+
- **Assertion Consumer Service URL**: `https://www.google.com/a/<your_domain.com>/acs`
38+
- **Name ID format**: _Email_
4039
7. Copy the **SSO endpoint**, **Access Entity ID or Issuer**, and **Public key**.
4140
8. Select **Save configuration**.
4241
9. Configure [Access policies](/cloudflare-one/policies/access/) for the application.
@@ -54,9 +53,9 @@ When configuring Google Cloud with Access, the following limitations apply:
5453
2. Select **Third-party SSO profile for your organization** > **Add SSO Profile**.
5554
3. Turn on **Set up SSO with third-party identity provider**.
5655
4. Fill in the following information:
57-
* **Sign-in page URL**: SSO endpoint from application configuration in Cloudflare Zero Trust.
58-
* **Sign-out page URL**: `https://<team-name>.cloudflareaccess.com/cdn-cgi/access/logout`, where `<team-name>` is your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
59-
* **Verification certificate**: Upload the `.crt` certificate file from step [2. Create a x.509 certificate](#2-create-a-x509-certificate).
56+
- **Sign-in page URL**: SSO endpoint from application configuration in Cloudflare Zero Trust.
57+
- **Sign-out page URL**: `https://<team-name>.cloudflareaccess.com/cdn-cgi/access/logout`, where `<team-name>` is your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
58+
- **Verification certificate**: Upload the `.crt` certificate file from step [2. Create a x.509 certificate](#2-create-a-x509-certificate).
6059
5. (Optional) Turn on **Use a domain specific issuer**. If you select this option, Google will send an issuer specific to your Google Cloud domain (`google.com/a/<your_domain.com>` instead of the standard `google.com`).
6160

6261
## 4. Test the integration
@@ -65,6 +64,6 @@ Open an incognito browser window and go to your Google Cloud URL (`https://conso
6564

6665
## Troubleshooting
6766

68-
`Error: G Suite - This account cannot be accessed because the login credentials could not be verified.`
67+
`Error: "G Suite - This account cannot be accessed because the login credentials could not be verified."`
6968

7069
If you see this error, it is likely that the public key and private key do not match. Confirm that your certificate file includes the correct public key.

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/google-workspace-saas.mdx

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,25 +4,22 @@ title: Google Workspace
44
updated: 2024-06-04
55
sidebar:
66
order: 13
7-
87
---
98

10-
import { GlossaryTooltip } from "~/components"
9+
import { GlossaryTooltip } from "~/components";
1110

12-
This guide covers how to configure [Google Workspace](https://support.google.com/a/topic/7579248?hl=en\&ref_topic=7556686\&sjid=14539485562330725560-NA) as a SAML application in Cloudflare Zero Trust.
11+
This guide covers how to configure [Google Workspace](https://support.google.com/a/topic/7579248?ref_topic=7556686&sjid=14539485562330725560-NA) as a SAML application in Cloudflare Zero Trust.
1312

1413
:::note
1514

16-
1715
The integration of Access as a single sign-on provider for your Google Workspace account does not work for Google super admins. It will work for other users.
1816

19-
2017
:::
2118

2219
## Prerequistes
2320

24-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
25-
* Admin access to a Google Workspace account
21+
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
22+
- Admin access to a Google Workspace account
2623

2724
## 1. Create an application in Zero Trust
2825

@@ -31,14 +28,14 @@ The integration of Access as a single sign-on provider for your Google Workspace
3128
2. Select **SaaS application**.
3229

3330
3. Fill in the following information:
34-
* **Application**: *Google*.
35-
* **Entity ID**: `google.com`
36-
* **Assertion Consumer Service URL**: `https://www.google.com/a/<your_domain.com>/acs`, where `<your_domain.com>` is your Google Workspace domain.
37-
* **Name ID Format**: *Email*.
31+
- **Application**: _Google_.
32+
- **Entity ID**: `google.com`
33+
- **Assertion Consumer Service URL**: `https://www.google.com/a/<your_domain.com>/acs`, where `<your_domain.com>` is your Google Workspace domain.
34+
- **Name ID Format**: _Email_.
3835

3936
:::caution
4037

41-
When you put your Google Workspace behind Access, users will not be able to log in using [Google](/cloudflare-one/identity/idp-integration/google/) or [Google Workspace](/cloudflare-one/identity/idp-integration/gsuite/) as an identity provider.
38+
When you put your Google Workspace behind Access, users will not be able to log in using [Google](/cloudflare-one/identity/idp-integration/google/) or [Google Workspace](/cloudflare-one/identity/idp-integration/gsuite/) as an identity provider.
4239
:::
4340

4441
4. On the next page, [create an Access policy](/cloudflare-one/policies/access/) for your application. For example, you could allow users with an `@your_domain.com` email address.
@@ -66,9 +63,9 @@ When you put your Google Workspace behind Access, users will not be able to log
6663
3. Select **Third-party SSO profile for your organization**.
6764
4. Enable **Set up SSO with third-party identity provider**.
6865
5. Fill in the following information:
69-
* **Sign-in page URL**: Copy and then paste your **SSO endpoint** from Zero Trust.
70-
* **Sign-out page URL**: `https://<team-name>.cloudflareaccess.com/cdn-cgi/access/logout`, where `<team-name>` is your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
71-
* **Verification certificate**: Upload the certificate file containing your public key.
66+
- **Sign-in page URL**: Copy and then paste your **SSO endpoint** from Zero Trust.
67+
- **Sign-out page URL**: `https://<team-name>.cloudflareaccess.com/cdn-cgi/access/logout`, where `<team-name>` is your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
68+
- **Verification certificate**: Upload the certificate file containing your public key.
7269
6. (Optional) Enable **Use a domain specific issuer**. If you select this option, Google will send an issuer specific to your Google Workspace domain (`google.com/a/<your_domain.com>` instead of the standard `google.com`).
7370

7471
## 4. Test the integration
@@ -81,6 +78,6 @@ An Access login screen should appear.
8178

8279
## Troubleshooting
8380

84-
`Error: G Suite - This account cannot be accessed because the login credentials could not be verified.`
81+
`Error: "G Suite - This account cannot be accessed because the login credentials could not be verified."`
8582

8683
If you see this error, it is likely that the public key and private key do not match. Confirm that your certificate file includes the correct public key.

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/zendesk-sso-saas.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,32 @@ title: Zendesk
44
updated: 2024-04-29
55
sidebar:
66
order: 29
7-
87
---
98

109
This guide covers how to configure [Zendesk](https://support.zendesk.com/hc/en-us/articles/4408887505690-Enabling-SAML-single-sign-on#topic_u54_wc3_z2b) as a SAML application in Cloudflare Zero Trust.
1110

1211
## Prerequisites
1312

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
15-
* Admin access to your Zendesk account
13+
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
- Admin access to your Zendesk account
1615

1716
## Configure Zendesk and Cloudflare
1817

1918
1. Go to your Zendesk administrator dashboard, typically available at `<yourdomain>.zendesk.com/admin/security/sso`.
2019

2120
2. In a separate tab or window, open [Zero Trust](https://one.dash.cloudflare.com), select your account, and go to **Access** > **Applications**.
2221

23-
3. Select **Add an application**, then choose *SaaS*.
22+
3. Select **Add an application**, then choose _SaaS_.
2423

2524
4. Input the following values in the Zero Trust application configuration:
2625

2726
| Zero Trust field | Value |
2827
| ---------------------------------- | ----------------------------------------------- |
2928
| **Entity ID** | `https://<yoursubdomain>.zendesk.com` |
3029
| **Assertion Consumer Service URL** | contents of **SAML SSO URL** in Zendesk account |
31-
| **Name ID Format** | *Email* |
30+
| **Name ID Format** | _Email_ |
3231

33-
5. (Optional) Configure these Attribute Statements to include a users first and last name:
32+
5. (Optional) Configure these Attribute Statements to include a user's first and last name:
3433

3534
| Cloudflare attribute name | IdP attribute value |
3635
| ------------------------- | ----------------------------------------------------------------- |
@@ -54,7 +53,7 @@ This guide covers how to configure [Zendesk](https://support.zendesk.com/hc/en-u
5453

5554
2. Wrap the value with `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
5655

57-
3. Set **Algorithm** to *SHA256* and select **Calculate Fingerprint**.
56+
3. Set **Algorithm** to _SHA256_ and select **Calculate Fingerprint**.
5857

5958
4. Copy the **Formatted FingerPrint** value.
6059

0 commit comments

Comments
 (0)