Skip to content

Commit ea14baa

Browse files
committed
PCX-16041
1 parent c9c46db commit ea14baa

File tree

3 files changed

+10
-8
lines changed

3 files changed

+10
-8
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/generic-oidc.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Your identity provider must support SCIM version 2.0.
125125

126126
### 1. Enable SCIM in Zero Trust
127127

128-
<Render file="access/enable-scim-on-dashboard" params={{ idp: "IdP" }} />
128+
<Render file="access/enable-scim-on-dashboard" params={{ idp: "OIDC" }} />
129129

130130
### 2. Configure SCIM in the IdP
131131

src/content/docs/cloudflare-one/identity/idp-integration/generic-saml.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Your identity provider must support SCIM version 2.0.
103103

104104
### 1. Enable SCIM in Zero Trust
105105

106-
<Render file="access/enable-scim-on-dashboard" params={{ idp: "IdP" }} />
106+
<Render file="access/enable-scim-on-dashboard" params={{ idp: "SAML" }} />
107107

108108
### 2. Configure SCIM in the IdP
109109

src/content/partials/cloudflare-one/access/enable-scim-on-dashboard.mdx

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,19 @@ import { Markdown } from "~/components"
88

99
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
1010

11-
2. Find the {props.idp} integration and select **Edit**.
11+
2. Find your {props.idp} integration and select **Edit**.
1212

1313
3. Turn on **Enable SCIM** {props.supportgroups && <span> and <strong>{props.supportgroups}</strong>.</span>}
1414

1515
4. (Optional) Configure the following settings:
1616

17-
* **Enable user deprovisioning**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when they are removed from the SCIM application in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/).
18-
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/identity/users/seat-management/) from your Zero Trust account when they are removed from the SCIM application in {props.idp}.
19-
* **SCIM identity update behavior**: Choose what happens in Zero Trust when the user's identity updates in {props.idp}.
20-
- _Automatic identity updates_: Automatically update the [User Registry identity](/cloudflare-one/insights/logs/users/) when {props.idp} sends an updated identity or group membership through SCIM. This identity is used for Gateway policies and WARP [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/); Access will read the user's updated identity when they reauthenticate.
21-
- _Group membership change reauthentication_: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). Access will read the user's updated group membership when they reauthenticate.
17+
* **Enable user deprovisioning**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when they are removed from the SCIM application in your IdP. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/).
18+
19+
If a user is deprovisioned via SCIM as a result of being disabled in your IdP, but then later re-enabled, Access will reactivate their SCIM user resource. As a result, if the user is disabled in the future, they will be successfully deprovisioned.
20+
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/identity/users/seat-management/) from your Zero Trust account when they are removed from the SCIM application in your IdP.
21+
* **SCIM identity update behavior**: Choose what happens in Zero Trust when the user's identity updates in your IdP.
22+
- _Automatic identity updates_: Automatically update the [User Registry identity](/cloudflare-one/insights/logs/users/) when your IdP sends an updated identity or group membership through SCIM. This identity is used for Gateway policies and WARP [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/); Access will read the user's updated identity when they reauthenticate.
23+
- _Group membership change reauthentication_: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in your IdP. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). Access will read the user's updated group membership when they reauthenticate.
2224
- _No action_: Update the user's identity the next time they reauthenticate to Access or WARP.
2325

2426
5. Select **Save**.

0 commit comments

Comments
 (0)