|
5 | 5 | order: 2 |
6 | 6 | --- |
7 | 7 |
|
| 8 | +import { Render } from "~/components"; |
| 9 | + |
8 | 10 | Cloudflare Zero Trust integrates with any identity provider that supports SAML 2.0. If your identity provider is not listed in the integration list of login methods in Zero Trust, it can be configured using SAML 2.0 (or OpenID if OIDC based). Generic SAML can also be used if you would like to pass additional SAML headers or claims for an IdP in the integration list. |
9 | 11 |
|
10 | 12 | ## Prerequisites |
@@ -45,13 +47,37 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web |
45 | 47 | 2. Select **Add new** and select **SAML**. |
46 | 48 | 3. Choose a descriptive name for your identity provider. |
47 | 49 | 4. Enter the **Single Sign on URL**, **IdP Entity ID or Issuer URL**, and **Signing certificate** obtained from your identity provider. |
48 | | -5. (Optional) Enter [optional configurations](#optional-configurations). |
49 | | -6. Select **Save**. |
| 50 | +5. (Optional) To enable SCIM, refer to [Synchronize users and groups](#synchronize-users-and-groups). |
| 51 | +6. (Optional) Under **Optional configurations**, configure [additional SAML options](#optional-configurations). |
| 52 | +7. Select **Save**. |
50 | 53 |
|
51 | 54 | ## 3. Test the connection |
52 | 55 |
|
53 | 56 | You can now [test the IdP integration](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust). A success response should return the configured SAML attributes. |
54 | 57 |
|
| 58 | +## Synchronize users and groups |
| 59 | + |
| 60 | +The generic SAML integration allows you to synchronize user groups and automatically deprovision users using [SCIM](/cloudflare-one/identity/users/scim/). |
| 61 | + |
| 62 | +### Prerequisites |
| 63 | + |
| 64 | +Your identity provider must support SCIM version 2.0. |
| 65 | + |
| 66 | +### 1. Enable SCIM in Zero Trust |
| 67 | + |
| 68 | +<Render |
| 69 | + file="access/enable-scim-on-dashboard" |
| 70 | + params={{ idp: "IdP"}} |
| 71 | +/> |
| 72 | + |
| 73 | +### 2. Configure SCIM in the IdP |
| 74 | + |
| 75 | +Setup instructions vary depending on the identity provider. In your identity provider, you will either need to edit the original [SSO application](#1-create-an-application-in-your-identity-provider) or create a new SCIM application. Refer to your identity provider's documentation for more details. For example instructions, refer to our [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) or [JumpCloud](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#synchronize-users-and-groups) guides. |
| 76 | + |
| 77 | +### 3. Verify SCIM provisioning |
| 78 | + |
| 79 | +<Render file="access/verify-scim-provisioning"/> |
| 80 | + |
55 | 81 | ## Optional configurations |
56 | 82 |
|
57 | 83 | SAML integrations allow you to pass additional headers or claims to applications. |
|
0 commit comments