You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This page provides generic instructions for setting up a SaaS application in Cloudflare Access using the SAML authentication protocol.
11
11
@@ -86,7 +86,7 @@ Open an incognito browser window and go to the SaaS application's login URL. You
86
86
-`email` - User's email address
87
87
-`groups` - Identity provider group membership
88
88
89
-
In Access for SaaS, you can add additional SAML attributes and customize the SAML statement sent to the SaaS application. This allows you to integrate SaaS applications which have specific SAML attribute requirements.
89
+
In Access for SaaS, you can add additional SAML attributes or customize the SAML statement sent to the SaaS application. This allows you to integrate SaaS applications which have specific SAML attribute requirements.
90
90
91
91
### SAML attribute statements
92
92
@@ -102,37 +102,23 @@ To send additional SAML attributes to your SaaS application, configure the follo
102
102
-**Required**: If a claim is marked as required but is not provided by an IdP, Cloudflare will fail the authentication request and show an error page.
103
103
-**Add per IdP claim**: (Optional) If you turned on multiple identity providers for the SaaS application, you can choose different attribute mappings for each IdP. These values will override the parent **IdP claim**.
104
104
105
-
### Transformation
105
+
### JSONata transforms
106
106
107
-
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the user identity before creating SAML attributes to be sent to the SaaS application. This is useful for setting defaults, excluding email addresses, or ensuring usernames meet arbitrary criteria.
107
+
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the [User Registry identity](/cloudflare-one/insights/logs/users/). This is useful for setting default values, excluding email addresses, or ensuring usernames meet arbitrary criteria. Access will send the modified user identity to the SaaS application as SAML attributes.
108
108
109
-
Note that JSONata Transformations are not compatible with SAML attribute statements. JSONata transformations will override any specified SAML attributes.
109
+
:::note
110
+
JSONata transformations are not compatible with [SAML attribute statements](#saml-attribute-statements). JSONata transformations will override any specified SAML attributes.
111
+
:::
110
112
111
-
For example, the following JSONata script modifies the `groups` attribute:
113
+
For example, the following JSONata script merges group names into a list and adds an `eduPersonPrincipalName` field which maps to the user email.
For more JSONata transform use cases, refer to the following examples.
214
+
215
+
<Detailsheader="Remove groups attribute">
216
+
217
+
The following JSONata script removes the `groups` SAML attribute. This can be useful if your SaaS application does not need to receive user group information.
0 commit comments