Skip to content

Commit b5b5d8b

Browse files
committed
add generic instructions
1 parent 4e4d8e1 commit b5b5d8b

File tree

2 files changed

+58
-4
lines changed

2 files changed

+58
-4
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/generic-oidc.mdx

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 1
66
---
77

8+
import { Render } from "~/components";
9+
810
Cloudflare Access has a generic OpenID Connect (OIDC) connector to help you integrate IdPs not already set in Access.
911

1012
## Set up a generic OIDC
@@ -39,12 +41,38 @@ Cloudflare Access has a generic OpenID Connect (OIDC) connector to help you inte
3941

4042
8. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/) if the protocol is supported by your IdP. PKCE will be performed on all login attempts.
4143

42-
9. (Optional) Under **Optional configurations**, enter [custom OIDC claims](#oidc-claims) that you wish to add to users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
44+
9. (Optional) To enable SCIM, refer to [Synchronize users and groups](#synchronize-users-and-groups).
45+
46+
10. (Optional) Under **Optional configurations**, enter [custom OIDC claims](#oidc-claims) that you wish to add to users' identity. This information will be available in the [user identity endpoint](/cloudflare-one/identity/authorization-cookie/application-token/#user-identity).
4347

44-
10. Select **Save**.
48+
11. Select **Save**.
4549

4650
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test. On success, a confirmation screen displays.
4751

52+
## Synchronize users and groups
53+
54+
The generic OIDC integration allows you to synchronize user groups and automatically deprovision users using [SCIM](/cloudflare-one/identity/users/scim/).
55+
56+
### Prerequisites
57+
58+
Your identity provider must support SCIM version 2.0.
59+
60+
### 1. Enable SCIM in Zero Trust
61+
62+
<Render
63+
file="access/enable-scim-on-dashboard"
64+
params={{ idp: "IdP"}}
65+
/>
66+
67+
### 2. Configure SCIM in the IdP
68+
69+
Setup instructions vary depending on the identity provider. In your identity provider, you will either need to edit the original [SSO application](#1-create-an-application-in-your-identity-provider) or create a new SCIM application. Refer to your identity provider's documentation for more details. For example instructions, refer to our [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) or [Jumpcloud](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#synchronize-users-and-groups) guides.
70+
71+
### 3. Verify SCIM provisioning
72+
73+
<Render file="access/verify-scim-provisioning"/>
74+
75+
4876
## Optional configurations
4977

5078
### OIDC claims

src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx

Lines changed: 28 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 2
66
---
77

8+
import { Render } from "~/components";
9+
810
Cloudflare Zero Trust integrates with any identity provider that supports SAML 2.0. If your identity provider is not listed in the integration list of login methods in Zero Trust, it can be configured using SAML 2.0 (or OpenID if OIDC based). Generic SAML can also be used if you would like to pass additional SAML headers or claims for an IdP in the integration list.
911

1012
## Prerequisites
@@ -45,13 +47,37 @@ To download the SAML metadata file, copy-paste the metadata endpoint into a web
4547
2. Select **Add new** and select **SAML**.
4648
3. Choose a descriptive name for your identity provider.
4749
4. Enter the **Single Sign on URL**, **IdP Entity ID or Issuer URL**, and **Signing certificate** obtained from your identity provider.
48-
5. (Optional) Enter [optional configurations](#optional-configurations).
49-
6. Select **Save**.
50+
5. (Optional) To enable SCIM, refer to [Synchronize users and groups](#synchronize-users-and-groups).
51+
6. (Optional) Under **Optional configurations**, configure [additional SAML options](#optional-configurations).
52+
7. Select **Save**.
5053

5154
## 3. Test the connection
5255

5356
You can now [test the IdP integration](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust). A success response should return the configured SAML attributes.
5457

58+
## Synchronize users and groups
59+
60+
The generic SAML integration allows you to synchronize user groups and automatically deprovision users using [SCIM](/cloudflare-one/identity/users/scim/).
61+
62+
### Prerequisites
63+
64+
Your identity provider must support SCIM version 2.0.
65+
66+
### 1. Enable SCIM in Zero Trust
67+
68+
<Render
69+
file="access/enable-scim-on-dashboard"
70+
params={{ idp: "IdP"}}
71+
/>
72+
73+
### 2. Configure SCIM in the IdP
74+
75+
Setup instructions vary depending on the identity provider. In your identity provider, you will either need to edit the original [SSO application](#1-create-an-application-in-your-identity-provider) or create a new SCIM application. Refer to your identity provider's documentation for more details. For example instructions, refer to our [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) or [JumpCloud](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#synchronize-users-and-groups) guides.
76+
77+
### 3. Verify SCIM provisioning
78+
79+
<Render file="access/verify-scim-provisioning"/>
80+
5581
## Optional configurations
5682

5783
SAML integrations allow you to pass additional headers or claims to applications.

0 commit comments

Comments
 (0)