Skip to content

Commit bbdebeb

Browse files
dcpenaAdamBouhmad
andauthored
Applying Adam's feedback
Co-authored-by: Adam Bouhmad <[email protected]>
1 parent e0dce44 commit bbdebeb

File tree

4 files changed

+8
-12
lines changed

4 files changed

+8
-12
lines changed

src/content/docs/fundamentals/account/account-security/scim-setup/entra.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,13 @@ sidebar:
1919
3. Enter your API token value and the tenant URL: `https://api.cloudflare.com/client/v4/accounts/<your_account_ID>/scim/v2`.
2020
4. Select **Test Connection**, then select **Save**.
2121

22-
## Configure user permissions in Microsoft Entra ID
22+
## Configure user & group sync in Microsoft Entra ID application
2323

2424
1. Once the SCIM application is created, [assign users and groups to the application](https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/assign-user-or-group-access-portal?pivots=portal).
2525

2626
:::note
27-
You must have opted into the Cloudflare User Groups Public Beta to synchronize groups from Okta to Cloudflare. Refer to the [User Groups](/fundamentals/setup/manage-members/user-groups/) documentation for more information.
27+
You must have opted into the Cloudflare User Groups Public Beta to synchronize groups from Microsoft Entra to Cloudflare. Refer to the [User Groups](/fundamentals/setup/manage-members/user-groups/) documentation for more information.
2828

29-
Currently, groups need to match a specific format to provision specific Cloudflare account-level roles. Cloudflare is in the process of adding Cloudflare Groups, which can take in freeform group names in the future.
3029
:::
3130

3231
2. To begin syncing your Users & Groups into Cloudflare, navigate back to **Provisioning**, and under **Provisioning Status**, check *On*, then select **Save**.
@@ -35,9 +34,8 @@ Currently, groups need to match a specific format to provision specific Cloudfla
3534
To successfully provision with Microsoft Entra ID, the `user principal name` and `email` fields must match. These values are case-sensitive.
3635
:::
3736

38-
3. To check which users and groups were synchronized, select **Provisioning logs**.
39-
4. To verify the integration, select **Provisioning Logs** in Entra ID application, and check the Cloudflare Dash Audit Logs by navigating to **Manage Account** > **Audit Log**.
40-
5. To grant permissions to Users & Groups in Cloudflare, refer to the Permission Policies guide.
37+
3. To validate which users and groups were synchronized, select **Provisioning logs** in Microsoft Entra. You can also check the Cloudflare Dashboard Audit Logs by navigating to **Manage Account** > **Audit Log**.
38+
4. To grant permissions to Users & Groups in Cloudflare, refer to the Permission Policies guide.
4139

4240

4341
## (Optional) Automate Cloudflare's SCIM integration

src/content/docs/fundamentals/account/account-security/scim-setup/index.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ This section covers SCIM provisioning for the Cloudflare dashboard only. If you
1414
## Limitations
1515

1616
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
17-
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM.
18-
- Cloudflare does not allow custom user groups.
1917

2018
## Prerequisites
2119

src/content/docs/fundamentals/account/account-security/scim-setup/okta.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The **Update User Attributes** option is not supported.
3030
5. Deselect **Import Groups**.
3131

3232

33-
## Set up your SCIM users and groups
33+
## Configure user & group sync in Okta
3434

3535
1. In **Provisioning to App**, select **Edit**.
3636
2. Enable **Create Users** and **Deactivate Users**. Select **Save**.

src/content/docs/fundamentals/manage-members/user-groups.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sidebar:
99

1010
import { Tabs, TabItem } from '~/components';
1111

12-
User Groups are a collection of [account members](/fundamentals/setup/manage-members/manage/) that are treated equally from an access control perspective. User Groups can be assigned roles, with individual members in the group receiving all permissions of the roles assigned to the User Group.
12+
User Groups are a collection of [account members](/fundamentals/setup/manage-members/manage/) that are treated equally from an access control perspective. User Groups can be assigned permission policies, with individual members in the group receiving all permissions of the roles assigned to the User Group.
1313

1414
:::note
1515
If you use the Cloudflare Dashboard SCIM integration, you can sync Groups from an upstream Identity Provider via SCIM. This allows you to centralize user and group management at your identity provider.
@@ -36,11 +36,11 @@ With your Group created, you can now add a [Permission Policy](/fundamentals/set
3636

3737
1. In the **Groups** tab under **Permission policies**, select **Add a Policy**.
3838
2. Specify the scope and permissions you want applied to the members of the group.
39-
3. Select **Create Policy** to apply it to the group. You return to the **Permission policies** for your Group.
39+
3. Select **Create Policy** to apply it to the group.
4040

4141
</TabItem> <TabItem label="API">
4242

43-
Using the role identifiers from the previous section, you can create a group policy.
43+
Using the role identifiers from the previous section, you can create a permission policy for your group.
4444

4545
`export ADMIN_ROLE='...' # id field from admin or desired role entry from permission_groups API response`
4646

0 commit comments

Comments
 (0)