Skip to content

Commit ca8cee4

Browse files
SCIM verification email note
1 parent dddd23d commit ca8cee4

File tree

1 file changed

+15
-15
lines changed
  • src/content/docs/fundamentals/setup/account/account-security

1 file changed

+15
-15
lines changed

src/content/docs/fundamentals/setup/account/account-security/scim-setup.mdx

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros
1111

1212
## Limitations
1313

14-
* If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
15-
* Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
16-
* Cloudflare does not currently allow custom group names to leave space for future development.
14+
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
15+
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
16+
- Cloudflare does not currently allow custom group names to leave space for future development.
1717

1818
## Prerequisites
1919

20-
* Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
21-
* In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
22-
* In your identity provider, the ability to create applications and groups.
20+
- Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
21+
- In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
22+
- In your identity provider, the ability to create applications and groups.
2323

24-
***
24+
:::note
25+
26+
Accounts provisioned with SCIM need to verify their email addresses.
27+
:::
28+
29+
---
2530

2631
## Create an API token
2732

@@ -42,27 +47,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros
4247

4348
5. Copy the token value.
4449

45-
***
50+
---
4651

4752
## Provision with Okta
4853

4954
### Set up your Okta SCIM application.
5055

5156
1. In the Okta dashboard, go to **Applications** > **Applications**.
52-
5357
2. Select **Browse App Catalog**.
54-
5558
3. Locate and select **SCIM 2.0 Test App (OAuth Bearer Token)**.
56-
5759
4. Select **Add Integration** and name your integration.
58-
5960
5. Enable the following options:
6061

6162
* **Do not display application icon to users**
6263
* **Do not display application icon in the Okta Mobile App**
6364

6465
6. Disable **Automatically log in when user lands on login page**.
65-
6666
7. Select **Next**, then select **Done**.
6767

6868
### Integrate the Cloudflare API.
@@ -102,7 +102,7 @@ This will provision all of the users affected to your Cloudflare account with "m
102102

103103
Adding any users to these groups will grant them the role. Removing the users from the identity provider will remove them from the associated role.
104104

105-
***
105+
---
106106

107107
## Provision with Microsoft Entra ID
108108

@@ -134,4 +134,4 @@ Refer to the list of [Roles](/fundamentals/setup/manage-members/roles/) for more
134134
4. Select **All records** under Source Object Scope.
135135
5. Select **Add scoping filter** and create the appropriate filtering criteria to capture only the necessary groups.
136136
6. Save the Attribute Mapping by selecting **OK** and return to the Enterprise Application Provisioning overview page.
137-
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
137+
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.

0 commit comments

Comments
 (0)