Skip to content

Conversation

@deadlypants1973
Copy link
Contributor

Summary

closes #21563
PCX-16687

Screenshots (optional)

Documentation checklist

  • The documentation style guide has been adhered to.
  • If a larger change - such as adding a new page- an issue has been opened in relation to any incorrect or out of date information that this PR fixes.
  • Files which have changed name or location have been allocated redirects.

@hyperlint-ai
Copy link
Contributor

hyperlint-ai bot commented Apr 17, 2025

Howdy and thanks for contributing to our repo. The Cloudflare team reviews new, external PRs within two (2) weeks. If it's been two weeks or longer without any movement, please tag the PR Assignees in a comment.

We review internal PRs within 1 week. If it's something urgent or has been sitting without a comment, start a thread in the Developer Docs space internally.


PR Change Summary

Revised the Microsoft Entra ID integration guide to reflect updated navigation and terminology in the Microsoft Entra admin center.

  • Updated navigation steps to access Microsoft Entra ID features.
  • Changed references from Azure to Microsoft Entra where applicable.
  • Clarified instructions for registering applications and obtaining necessary IDs.
  • Modified SCIM setup instructions for better clarity.

Modified Files

  • src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx
  • src/content/partials/cloudflare-one/access/enable-scim-on-dashboard.mdx

How can I customize these reviews?

Check out the Hyperlint AI Reviewer docs for more information on how to customize the review.

If you just want to ignore it on this PR, you can add the hyperlint-ignore label to the PR. Future changes won't trigger a Hyperlint review.

Note specifically for link checks, we only check the first 30 links in a file and we cache the results for several hours (for instance, if you just added a page, you might experience this). Our recommendation is to add hyperlint-ignore to the PR to ignore the link check for this PR.

@github-actions
Copy link
Contributor

github-actions bot commented Apr 17, 2025

6. Select **Register an application to integrate with Microsoft Entra ID (App you're developing)** and then select **Create**.

7. Under **Redirect URI**, select the _Web_ platform and enter the following URL:
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
7. Under **Redirect URI**, select the _Web_ platform and enter the following URL.
6. Under **Redirect URI**, select the _Web_ platform and enter the following URL.


![Registering an application in Azure](~/assets/images/cloudflare-one/identity/azure/name-app.png)

8. Select **Register**.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
8. Select **Register**.
7. Select **Register**.

8. Select **Register**.

9. Next, return to Microsoft Entra ID and go to go to **Manage** > **App registrations**.
9. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
9. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.
8. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.

9. Next, return to Microsoft Entra ID and go to **Applications** > **App registrations**.

10. Select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**.
10. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
10. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
9. Select **All applications** and select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**. You will need these values when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).

:::

13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation.
13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation. You will need this client secret value when [adding Entra ID as an identity provider in step 3](/cloudflare-one/identity/idp-integration/entra-id/#3-add-entra-id-as-an-identity-provider).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can't seem to edit all of the numbering - but the numbered list needs to shift down

</TabItem> <TabItem label="Terraform">

:::note[Provider versions]
The following example requires Cloudflare provider version `>=4.40.0`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The following example requires Cloudflare provider version `>=4.40.0`.
The following example requires Cloudflare provider version `4.40.0` or later.

Nit


<Render file="access/verify-scim-provisioning" />

To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).
To monitor the exchange of identity details between Cloudflare Access and Microsoft Entra ID, go to [Zero Trust](https://one.dash.cloudflare.com) > **Logs** > **SCIM provisioning** and view the [SCIM activity logs](/cloudflare-one/insights/logs/scim-logs/).

@deadlypants1973 deadlypants1973 merged commit 1ede7b4 into production Apr 17, 2025
12 checks passed
@deadlypants1973 deadlypants1973 deleted the kate/fixes-microentraid branch April 17, 2025 17:25
RebeccaTamachiro pushed a commit that referenced this pull request Apr 21, 2025
* [CF1] microsoft entra ID IdP guide revision

* final edits

* final
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants