Skip to content

Commit b79cf74

Browse files
authored
move IdP docs (#25998)
1 parent f6261cf commit b79cf74

File tree

106 files changed

+177
-158
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+177
-158
lines changed

public/__redirects

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2318,7 +2318,7 @@
23182318
/changelog-next/* /changelog/:splat 301
23192319
/browser-rendering/quick-actions-rest-api/* /browser-rendering/rest-api/:splat 301
23202320
/*/sitemap.xml /sitemap-index.xml 301
2321-
/access/configuring-identity-providers/* /cloudflare-one/identity/idp-integration/:splat 301
2321+
/access/configuring-identity-providers/* /cloudflare-one/integrations/identity-providers/:splat 301
23222322
/api-security/* /api-shield/:splat 301
23232323
/api-shield/products/* /api-shield/security/:splat 301
23242324
/distributed-web/* /web3/:splat 301
@@ -2383,6 +2383,11 @@
23832383
/cloudflare-one/policies/data-loss-prevention/configuration-guides/* /cloudflare-one/policies/data-loss-prevention/dlp-policies/common-policies/ 301
23842384
/cloudflare-one/policies/data-loss-prevention/datasets/* /cloudflare-one/policies/data-loss-prevention/detection-entries/:splat 301
23852385

2386+
# Cloudflare One nav revamp
2387+
/cloudflare-one/identity/one-time-pin/ /cloudflare-one/integrations/identity-providers/one-time-pin/ 301
2388+
/cloudflare-one/identity/idp-integration/* /cloudflare-one/integrations/identity-providers/:splat 301
2389+
2390+
23862391
# Learning paths
23872392

23882393
/learning-paths/modules/get-started/onboarding/* /learning-paths/get-started-free/onboarding/:splat 301

src/content/changelog/fundamentals/2025-10-14-sso-self-service-ux.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ date: 2025-10-14
88

99
![Screenshot of new user experience for managing SSO](~/assets/images/changelog/fundamentals/2025-10-14-sso-configuration-ux.png)
1010

11-
During Birthday Week, we announced that [single sign-on (SSO) is available for free](https://blog.cloudflare.com/enterprise-grade-features-for-all/) to everyone who signs in with a custom email domain and maintains a compatible [identity provider](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). SSO minimizes user friction around login and provides the strongest security posture available. At the time, this could only be configured using the API.
11+
During Birthday Week, we announced that [single sign-on (SSO) is available for free](https://blog.cloudflare.com/enterprise-grade-features-for-all/) to everyone who signs in with a custom email domain and maintains a compatible [identity provider](https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/). SSO minimizes user friction around login and provides the strongest security posture available. At the time, this could only be configured using the API.
1212

1313
Today, we are launching a new user experience which allows users to manage their SSO configuration from within the Cloudflare dashboard. You can access this by going to **Manage account** > **Members** > **Settings**.
1414

src/content/docs/agents/model-context-protocol/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Remember — [authentication is different from authorization](https://www.cloud
7979

8080
### (2) Cloudflare Access integration
8181

82-
You can use Cloudflare Access as a Single Sign-On (SSO) provider to authorize users to your MCP server. Users log in using a [configured identity provider](/cloudflare-one/identity/idp-integration/) or a [one-time PIN](/cloudflare-one/identity/one-time-pin/), and they are only granted access if their identity matches your [Access policies](/cloudflare-one/policies/access/).
82+
You can use Cloudflare Access as a Single Sign-On (SSO) provider to authorize users to your MCP server. Users log in using a [configured identity provider](/cloudflare-one/integrations/identity-providers/) or a [one-time PIN](/cloudflare-one/integrations/identity-providers/one-time-pin/), and they are only granted access if their identity matches your [Access policies](/cloudflare-one/policies/access/).
8383

8484
To deploy an [example MCP server](https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-cf-access) with Cloudflare Access as the OAuth provider, refer to [Secure MCP servers with Access for SaaS](/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/).
8585

src/content/docs/cloudflare-one/applications/configure-apps/mcp-servers/mcp-portals.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ An MCP server portal centralizes multiple [Model Context Protocol (MCP) servers]
2424

2525
- An [active domain on Cloudflare](/fundamentals/manage-domains/add-site/)
2626
- Domain uses either a [full setup](/dns/zone-setups/full-setup/) or a [partial (`CNAME`) setup](/dns/zone-setups/partial-setup/)
27-
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured on Cloudflare Zero Trust
27+
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured on Cloudflare Zero Trust
2828

2929
## Add an MCP server
3030

@@ -107,7 +107,7 @@ Cloudflare Access automatically creates an Access application for each MCP serve
107107
2. Find the portal that you want to configure, then select the three dots > **Edit**.
108108
3. To configure identity providers for the portal:
109109
1. Select the **Login methods** tab.
110-
2. Select the [identity providers](/cloudflare-one/identity/idp-integration/) that you want to enable for your application.
110+
2. Select the [identity providers](/cloudflare-one/integrations/identity-providers/) that you want to enable for your application.
111111
3. (Recommended) If you plan to only allow access via a single identity provider, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
112112
4. To customize the block page:
113113
1. Select the **Experience settings** tab.
@@ -131,7 +131,7 @@ Workers AI Playground will show a **Connected** status and list the available to
131131

132132
For MCP clients with server configuration files, we recommend using the `npx` command with the `mcp-remote@latest` argument:
133133

134-
``` json title= "MCP client configuration for MCP portals"
134+
``` json title= "MCP client configuration for MCP portals"
135135
{
136136
"mcpServers": {
137137
"example-mcp-server": {
@@ -143,7 +143,7 @@ For MCP clients with server configuration files, we recommend using the `npx` co
143143
]
144144
}
145145
}
146-
}
146+
}
147147
```
148148

149149
We do not recommend using the `serverURL` parameter since it may cause issues with portal session creation and management.

src/content/docs/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ import { Render, GlossaryTooltip, Tabs, TabItem, APIRequest } from "~/components
1212

1313
You can secure [Model Context Protocol (MCP) servers](https://www.cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/) by using Cloudflare Access as an OAuth Single Sign-On (SSO) provider.
1414

15-
This guide walks through how to deploy a remote <GlossaryTooltip term="MCP server">MCP server</GlossaryTooltip> on [Cloudflare Workers](/workers/) that requires Cloudflare Access for authentication. When users connect to the MCP server using an <GlossaryTooltip term="MCP client">MCP client</GlossaryTooltip>, they will be prompted to log in to your [identity provider](/cloudflare-one/identity/idp-integration/) and are only granted access if they pass your [Access policies](/cloudflare-one/policies/access/#selectors).
15+
This guide walks through how to deploy a remote <GlossaryTooltip term="MCP server">MCP server</GlossaryTooltip> on [Cloudflare Workers](/workers/) that requires Cloudflare Access for authentication. When users connect to the MCP server using an <GlossaryTooltip term="MCP client">MCP client</GlossaryTooltip>, they will be prompted to log in to your [identity provider](/cloudflare-one/integrations/identity-providers/) and are only granted access if they pass your [Access policies](/cloudflare-one/policies/access/#selectors).
1616

1717
## Prerequisites
1818

19-
- Add an [identity provider](/cloudflare-one/identity/idp-integration/) to Cloudflare Zero Trust
19+
- Add an [identity provider](/cloudflare-one/integrations/identity-providers/) to Cloudflare Zero Trust
2020
- Install [npm](https://docs.npmjs.com/getting-started)
2121
- Install [Node.js](https://nodejs.org/en/)
2222

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/adobe-sign-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This guide covers how to configure [Adobe Acrobat Sign](https://helpx.adobe.com/
1111

1212
## Prerequisites
1313

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
* An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
1515
* Admin access to a Adobe Acrobat Sign account
1616
* A [claimed domain](https://helpx.adobe.com/sign/using/claim-domain-names.html) in Adobe Acrobat Sign
1717

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/area-1.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import { Render } from "~/components";
1515

1616
## Prerequisites
1717

18-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
18+
* An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
1919
* Admin access to your Area 1 account
2020
* Your user's email in Area 1 matches their email in Zero Trust
2121

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/asana-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This guide covers how to configure [Asana](https://help.asana.com/hc/en-us/artic
1111

1212
## Prerequisites
1313

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
* An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
1515
* Super admin access to an Asana Enterprise, Enterprise+, or Legacy Enterprise account
1616

1717
## 1. Add a SaaS application to Cloudflare Zero Trust

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/atlassian-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This guide covers how to configure [Atlassian Cloud](https://support.atlassian.c
1111

1212
## Prerequisites
1313

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
* An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
1515
* Admin access to an Atlassian Cloud account
1616
* Atlassian Guard Standard subscription
1717
* A [domain](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts/) verified in Atlassian Cloud

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/aws-sso-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This guide covers how to configure [AWS](https://docs.aws.amazon.com/singlesigno
1111

1212
## Prerequisites
1313

14-
* An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
14+
* An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
1515
* Admin access to an AWS account
1616

1717
## 1. Get AWS URLs

0 commit comments

Comments
 (0)