Skip to content

Commit bd27f5e

Browse files
final updates
1 parent 31d23db commit bd27f5e

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ To retrieve those values:
2929

3030
5. Select **Register an application to integrate with Microsoft Entra ID (App you're developing)**. If offered, do not select any of the gallery applications. Select **Create**.
3131

32-
7. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Custom Pages** and find your team name.
33-
34-
Under **Redirect URI**, select the _Web_ platform and enter the following URL:
32+
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
3533

3634
```txt
3735
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
3836
```
3937

38+
In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Custom Pages** to find your team name.
39+
4040
![Registering an application in Azure](~/assets/images/cloudflare-one/identity/azure/name-app.png)
4141

4242
8. Select **Register**.
@@ -99,9 +99,9 @@ More narrow permissions may be used, however this is the set of permissions that
9999

100100
4. Enter the **Application (client) ID**, **Client secret**, and **Directory (tenant) ID** obtained from Microsoft Entra ID.
101101

102-
5. To [test](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) that your connection is working, select **Test**.
102+
5. Select **Save**.
103103

104-
6. Select **Save**.
104+
6. To [test](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) that your connection is working, select **Test**.
105105

106106
7. (Optional) Configure the following settings:
107107

@@ -198,17 +198,15 @@ SCIM requires a separate enterprise application from the one created during [ini
198198

199199
3. Name your application (for example, `Cloudflare Access SCIM`).
200200

201-
4. Select **Integrate any other application you don't find in the gallery (Non-gallery)**. If offered, do not select any of the gallery applications.
201+
4. Select **Integrate any other application you don't find in the gallery (Non-gallery)**. If offered, do not select any of the gallery applications. Select **Create**.
202202

203-
(check this part with Tim)
204-
205-
5. Select **New configuration**.
203+
5. After you have created the application, go to **Provisioning** > select **New Configuration**.
206204

207205
6. In the **Tenant URL** field, enter the **SCIM Endpoint** obtained from your Entra ID integration in Zero Trust [in the previous step](/cloudflare-one/identity/idp-integration/entra-id/#1-enable-scim-in-zero-trust).
208206

209207
7. In the **Secret token** field, enter the **SCIM Secret** obtained from your Entra ID integration in Zero Trust [in the previous step](/cloudflare-one/identity/idp-integration/entra-id/#1-enable-scim-in-zero-trust).
210208

211-
8. Select **Test Connection** to ensure that the credentials were entered correctly.
209+
8. Select **Test Connection** to ensure that the credentials were entered correctly. If the test fails, go to your Entra ID integration in Zero Trust, select **Regenerate Secret**, select **Save**, and enter your new **SCIM Secret** in the **Secret token** field.
212210

213211
9. Select **Create**.
214212

@@ -224,10 +222,12 @@ SCIM requires a separate enterprise application from the one created during [ini
224222

225223
13. On the **Overview** page in Entra ID, you will see the synchronization status.
226224

227-
To check which users and groups were synchronized, select **View provisioning logs**.
225+
To check which users and groups were synchronized, select **Provisioning logs**.
228226

229227
<Render file="access/verify-scim-provisioning" />
230228

229+
To monitor the exchange of identity details between Access and Microsoft Entra ID in the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/), go to **Logs** in Zero Trust and select **SCIM provisioning**.
230+
231231
### Provisioning attributes
232232

233233
Provisioning attributes define the user properties that Entra ID will synchronize with Cloudflare Access. To modify your provisioning attributes, go to the **Attribute mapping** and select **Provision Microsoft Entra ID Users**.
@@ -257,7 +257,7 @@ You can create Access and Gateway policies for groups that are not synchronized
257257

258258
1. Make sure you enable **Support groups** as you set up Microsoft Entra ID in Zero Trust.
259259

260-
2. On your Azure dashboard, note the `Object Id` for the Entra group. In the example below, the group named Admins has an ID of `61503835-b6fe-4630-af88-de551dd59a2`.
260+
2. In your Microsoft Entra dashboard, note the `Object Id` for the Entra group. In the example below, the group named Admins has an ID of `61503835-b6fe-4630-af88-de551dd59a2`.
261261

262262
![Viewing the Azure group ID on the Azure dashboard](~/assets/images/cloudflare-one/identity/azure/object-id.png)
263263

src/content/partials/cloudflare-one/access/enable-scim-on-dashboard.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ import { Markdown } from "~/components"
2121
- _Group membership change reauthentication_: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). Access will read the user's updated group membership when they reauthenticate.
2222
- _No action_: Update the user's identity the next time they reauthenticate to Access or WARP.
2323

24-
5. Select **Save**.
24+
5. Select **Regenerate Secret**. Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into {props.idp}.
2525

26-
6. Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into {props.idp}.
26+
6. Select **Save**.
2727

2828
The SCIM secret never expires, but you can manually regenerate the secret at any time.

0 commit comments

Comments
 (0)