Skip to content

Commit f843af6

Browse files
authored
Update okta.mdx (#18810)
1 parent b1c6dd9 commit f843af6

File tree

1 file changed

+4
-4
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+4
-4
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -131,14 +131,14 @@ The Okta integration allows you to synchronize IdP groups and automatically depr
131131

132132
13. Select **Save** to complete the configuration.
133133

134-
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group.
134+
14. In the **Assignments** tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
135+
136+
15. In the **Push Groups** tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder and are the group memberships that will be added and removed upon membership change in Okta.
135137

136138
:::note
137-
Groups in this SCIM app integration should match the groups in your base [OIDC app integration](/cloudflare-one/identity/idp-integration/okta/#set-up-okta-as-an-oidc-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
139+
Groups in this SCIM app Push Groups integration should match the groups in your base [OIDC app integration](/cloudflare-one/identity/idp-integration/okta/#set-up-okta-as-an-oidc-provider). Because SCIM group membership updates will overwrite any groups in a user's identity, assigning the same groups to each app ensures consistent policy evaluation.
138140
:::
139141

140-
15. In the **Push Groups** tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder.
141-
142142
To verify the integration, select **View Logs** in the Okta SCIM application.
143143

144144
<Render file="access/verify-scim-provisioning"/>

0 commit comments

Comments
 (0)