You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,14 +29,14 @@ To retrieve those values:
29
29
30
30
5. Select **Register an application to integrate with Microsoft Entra ID (App you're developing)**. If offered, do not select any of the gallery applications. Select **Create**.
31
31
32
-
7. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Custom Pages** and find your team name.
33
-
34
-
Under **Redirect URI**, select the _Web_ platform and enter the following URL:
32
+
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Custom Pages** to find your team name.
39
+
40
40

41
41
42
42
8. Select **Register**.
@@ -99,9 +99,9 @@ More narrow permissions may be used, however this is the set of permissions that
99
99
100
100
4. Enter the **Application (client) ID**, **Client secret**, and **Directory (tenant) ID** obtained from Microsoft Entra ID.
101
101
102
-
5.To [test](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) that your connection is working, select **Test**.
102
+
5.Select **Save**.
103
103
104
-
6.Select **Save**.
104
+
6.To [test](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) that your connection is working, select **Test**.
105
105
106
106
7. (Optional) Configure the following settings:
107
107
@@ -198,17 +198,15 @@ SCIM requires a separate enterprise application from the one created during [ini
198
198
199
199
3. Name your application (for example, `Cloudflare Access SCIM`).
200
200
201
-
4. Select **Integrate any other application you don't find in the gallery (Non-gallery)**. If offered, do not select any of the gallery applications.
201
+
4. Select **Integrate any other application you don't find in the gallery (Non-gallery)**. If offered, do not select any of the gallery applications. Select **Create**.
202
202
203
-
(check this part with Tim)
204
-
205
-
5. Select **New configuration**.
203
+
5. After you have created the application, go to **Provisioning** > select **New Configuration**.
206
204
207
205
6. In the **Tenant URL** field, enter the **SCIM Endpoint** obtained from your Entra ID integration in Zero Trust [in the previous step](/cloudflare-one/identity/idp-integration/entra-id/#1-enable-scim-in-zero-trust).
208
206
209
207
7. In the **Secret token** field, enter the **SCIM Secret** obtained from your Entra ID integration in Zero Trust [in the previous step](/cloudflare-one/identity/idp-integration/entra-id/#1-enable-scim-in-zero-trust).
210
208
211
-
8. Select **Test Connection** to ensure that the credentials were entered correctly.
209
+
8. Select **Test Connection** to ensure that the credentials were entered correctly. If the test fails, go to your Entra ID integration in Zero Trust, select **Regenerate Secret**, select **Save**, and enter your new **SCIM Secret** in the **Secret token** field.
212
210
213
211
9. Select **Create**.
214
212
@@ -224,10 +222,12 @@ SCIM requires a separate enterprise application from the one created during [ini
224
222
225
223
13. On the **Overview** page in Entra ID, you will see the synchronization status.
226
224
227
-
To check which users and groups were synchronized, select **View provisioning logs**.
225
+
To check which users and groups were synchronized, select **Provisioning logs**.
228
226
229
227
<Renderfile="access/verify-scim-provisioning" />
230
228
229
+
To monitor the exchange of identity details between Access and Microsoft Entra ID in the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/), go to **Logs** in Zero Trust and select **SCIM provisioning**.
230
+
231
231
### Provisioning attributes
232
232
233
233
Provisioning attributes define the user properties that Entra ID will synchronize with Cloudflare Access. To modify your provisioning attributes, go to the **Attribute mapping** and select **Provision Microsoft Entra ID Users**.
@@ -257,7 +257,7 @@ You can create Access and Gateway policies for groups that are not synchronized
257
257
258
258
1. Make sure you enable **Support groups** as you set up Microsoft Entra ID in Zero Trust.
259
259
260
-
2.On your Azure dashboard, note the `Object Id` for the Entra group. In the example below, the group named Admins has an ID of `61503835-b6fe-4630-af88-de551dd59a2`.
260
+
2.In your Microsoft Entra dashboard, note the `Object Id` for the Entra group. In the example below, the group named Admins has an ID of `61503835-b6fe-4630-af88-de551dd59a2`.
261
261
262
262

Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/access/enable-scim-on-dashboard.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,8 +21,8 @@ import { Markdown } from "~/components"
21
21
-_Group membership change reauthentication_: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). Access will read the user's updated group membership when they reauthenticate.
22
22
-_No action_: Update the user's identity the next time they reauthenticate to Access or WARP.
23
23
24
-
5. Select **Save**.
24
+
5. Select **Regenerate Secret**. Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into {props.idp}.
25
25
26
-
6.Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into {props.idp}.
26
+
6.Select **Save**.
27
27
28
28
The SCIM secret never expires, but you can manually regenerate the secret at any time.
0 commit comments