Skip to content

Commit f2c34e3

Browse files
committed
update partial params
1 parent 2275c7b commit f2c34e3

File tree

3 files changed

+13
-11
lines changed

3 files changed

+13
-11
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ The Microsoft Entra ID integration allows you to synchronize IdP groups and auto
120120

121121
<Render
122122
file="access/enable-scim-on-dashboard"
123-
params={{ one: "Enable SCIM and Support groups" }}
123+
params={{ idp: "Entra ID", and: " and ", supportgroups: "Support groups"}}
124124
/>
125125

126126
### 2. Configure SCIM in Entra ID

src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ The Okta integration allows you to synchronize IdP groups and automatically depr
9292

9393
<Render
9494
file="access/enable-scim-on-dashboard"
95-
params={{ one: "Enable SCIM " }}
95+
params={{ idp: "Okta"}}
9696
/>
9797

9898
### 2. Configure SCIM in Okta
Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,26 @@
11
---
2-
inputParameters: param1
3-
2+
params:
3+
- idp
4+
- and
5+
- supportgroups
46
---
57

68
import { Markdown } from "~/components"
79

810
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
911

10-
2. Locate the IdP you want to synchronize and select **Edit**.
12+
2. Find the {props.idp} integration and select **Edit**.
1113

12-
3. Select {props.one}.
14+
3. Turn on **Enable SCIM**{props.and}**{props.supportgroups}**.
1315

14-
4. (Optional) Enable the following settings:
16+
4. (Optional) Turn on the following settings:
1517

16-
* **Enable user deprovisioning**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when they are removed from the SCIM application in the IdP. This will invalidate all active Access sessions and prompt for reauthentication for any Gateway WARP session policies.
17-
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/identity/users/seat-management/) from your Zero Trust account when they are removed from the SCIM application in the IdP.
18-
* **Enable group membership change reauthentication**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in the IdP. This will invalidate all active Access sessions and prompt for reauthentication for any Gateway WARP session policies. Access will read the user's updated group membership when they reauthenticate.
18+
* **Enable user deprovisioning**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when they are removed from the SCIM application in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any Gateway WARP session policies.
19+
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/identity/users/seat-management/) from your Zero Trust account when they are removed from the SCIM application in {props.idp}.
20+
* **Enable group membership change reauthentication**: [Revoke a user's active session](/cloudflare-one/identity/users/session-management/#per-user) when their group membership changes in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any Gateway WARP session policies. Access will read the user's updated group membership when they reauthenticate.
1921

2022
5. Select **Save**.
2123

22-
6. Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into the IdP.
24+
6. Copy the **SCIM Endpoint** and **SCIM Secret**. You will need to enter these values into {props.idp}.
2325

2426
The SCIM secret never expires, but you can manually regenerate the secret at any time.

0 commit comments

Comments
 (0)