You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can integrate Microsoft Entra ID (formerly Azure Active Directory) with Cloudflare Zero Trust and build policies based on user identity and group membership. Users will authenticate to Zero Trust using their Entra ID credentials.
9
9
@@ -93,6 +93,8 @@ More narrow permissions may be used, however this is the set of permissions that
The following example requires Cloudflare provider version `>=4.40.0`.
147
+
:::
148
+
149
+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
150
+
-`Access: Organizations, Identity Providers, and Groups Write`
151
+
152
+
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
153
+
154
+
<Renderfile="access/entra-id-terraform" />
155
+
156
+
</TabItem> </Tabs>
157
+
117
158
#### UPN and email
118
159
119
160
If your organization's UPNs do not match users' email addresses, you must add a custom claim for email. For example, if your organization's email format is `[email protected]` but the UPN is `[email protected]`, you must create an email claim if you are configuring email-based policies.
@@ -264,18 +305,3 @@ You can require users to re-enter their credentials into Entra ID whenever they
0 commit comments