Skip to content

Commit fc242ea

Browse files
authored
Changes to align with style guide
1 parent 8a578a5 commit fc242ea

File tree

1 file changed

+10
-12
lines changed
  • src/content/docs/fundamentals/account/account-security/scim-setup

1 file changed

+10
-12
lines changed

src/content/docs/fundamentals/account/account-security/scim-setup/entra.mdx

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,37 +13,35 @@ Once you have [gathered the required data](/fundamentals/account/account-securit
1313

1414
## Set up the Enterprise application
1515

16-
1. Go to the Entra admin center, select **Applications** > **Enterprise Applications**.
16+
1. Go to the Entra admin center and select **Applications** > **Enterprise Applications**.
1717
2. In the Microsoft Entra Gallery, select **New application** > **Create your own application**, then choose a name.
18-
3. Select **"Integrate any other application you don't find in the gallery (Non-gallery)"**.
18+
3. Select **Integrate any other application you don't find in the gallery (Non-gallery)**.
1919
4. **Create** an application.
2020

2121
## Provision the Enterprise application
2222

23-
1. Inside the application just created, under **Manage** on the sidebar menu, select **Provisioning**.
24-
2. Select **New configuration** and enter the **Tenant URL**: `https://api.cloudflare.com/client/v4/accounts/<Account_ID>/scim/v2`, replace `<Account_ID>` with your own account ID.
23+
1. Inside the newly created application under **Manage** from the sidebar menu, select **Provisioning**.
24+
2. Select **New configuration** and enter the **Tenant URL**: `https://api.cloudflare.com/client/v4/accounts/<ACCOUNT_ID>/scim/v2`. Replace `<ACCOUNT_ID>` with your own account ID.
2525
3. Paste the SCIM provisioning API token value as **Secret token**.
26-
4. Select **Test Connection**, then **Save** the configuration.
26+
4. Select **Test Connection** then **Save** the configuration.
2727

28-
## Configure user & group synchronization
28+
## Configure user and group synchronization
2929

30-
1. Navigate to the application just created, under **Manage** on the sidebar menu, select **Users and groups**.
30+
1. Navigate to the newly created application under **Manage** from the sidebar menu, select **Users and groups**.
3131
2. [Assign users and groups to the application](https://learn.microsoft.com/entra/identity/enterprise-apps/assign-user-or-group-access-portal).
3232
3. After the users are assigned, navigate to **Provisioning** on the sidebar menu and select **Start Provisioning**.
3333

3434
:::note
35-
To successfully synchronize the group details into Cloudflare:
36-
1. The `User Principal Name` (of `Identity`) and `Email` (of `Contact Information`) fields of each user must be identical (values are case-sensitive). Learn more about [how to create, invite, and delete users](https://learn.microsoft.com/entra/fundamentals/how-to-create-delete-users).
37-
2. User Principal Name should only contain alphanumeric characters.
35+
To successfully synchronize the group details into Cloudflare the `User Principal Name` (of `Identity`) and `Email` (of `Contact Information`) fields of each user must be identical. Values are case-sensitive, and the User Principal Name can only contain alphanumeric characters. Learn more about [how to create, invite, and delete users](https://learn.microsoft.com/entra/fundamentals/how-to-create-delete-users).
3836
:::
3937

40-
3. To validate which users and groups have been synchronized, navigate to **Provisioning logs** on the sidebar menu. You can also [review the Cloudflare Audit Logs](/fundamentals/account/account-security/review-audit-logs/).
38+
4. To validate which users and groups have been synchronized, navigate to **Provisioning logs** on the sidebar menu. You can also [review the Cloudflare Audit Logs](/fundamentals/account/account-security/review-audit-logs/).
4139

4240
:::caution[Read-only group]
4341
If the Entra group shares the same name of an existing Cloudflare user group, the Cloudflare user group will become read-only after the provisioning.
4442
:::
4543

46-
4. To grant permissions to users & groups at Cloudflare, refer to [Roles](/fundamentals/manage-members/roles/) and [Policies](/fundamentals/manage-members/policies/).
44+
5. To grant permissions to users and groups at Cloudflare, refer to [Roles](/fundamentals/manage-members/roles/) and [Policies](/fundamentals/manage-members/policies/).
4745

4846
## (Optional) Automate Cloudflare's SCIM integration
4947

0 commit comments

Comments
 (0)