Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -11,17 +11,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros

## Limitations

* If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
* Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
* Cloudflare does not currently allow custom group names to leave space for future development.
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM. We are working on this limitation.
- Cloudflare does not currently allow custom group names to leave space for future development.

## Prerequisites

* Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
* In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
* In your identity provider, the ability to create applications and groups.
- Cloudflare provisioning with SCIM is only available to Enterprise customers and requires a Cloudflare-specific feature flag. Contact your account team for more information.
- In Cloudflare, [Super Administrator](/fundamentals/setup/manage-members/roles/) access on the account.
- In your identity provider, the ability to create applications and groups.

***
:::note

Accounts provisioned with SCIM need to verify their email addresses.
:::

---

## Create an API token

Expand All @@ -42,27 +47,22 @@ Currently, we only provide SCIM support for Enterprise customers, and for Micros

5. Copy the token value.

***
---

## Provision with Okta

### Set up your Okta SCIM application.

1. In the Okta dashboard, go to **Applications** > **Applications**.

2. Select **Browse App Catalog**.

3. Locate and select **SCIM 2.0 Test App (OAuth Bearer Token)**.

4. Select **Add Integration** and name your integration.

5. Enable the following options:

* **Do not display application icon to users**
* **Do not display application icon in the Okta Mobile App**

6. Disable **Automatically log in when user lands on login page**.

7. Select **Next**, then select **Done**.

### Integrate the Cloudflare API.
Expand Down Expand Up @@ -102,7 +102,7 @@ This will provision all of the users affected to your Cloudflare account with "m

Adding any users to these groups will grant them the role. Removing the users from the identity provider will remove them from the associated role.

***
---

## Provision with Microsoft Entra ID

Expand Down Expand Up @@ -134,4 +134,4 @@ Refer to the list of [Roles](/fundamentals/setup/manage-members/roles/) for more
4. Select **All records** under Source Object Scope.
5. Select **Add scoping filter** and create the appropriate filtering criteria to capture only the necessary groups.
6. Save the Attribute Mapping by selecting **OK** and return to the Enterprise Application Provisioning overview page.
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
Loading