Skip to content
Visit Access on GitHub
Set theme to dark (⇧+D)


Okta provides cloud software that helps companies manage secure user authentication, and helps developers build identity controls into applications, website web services, and devices. Cloudflare Access can integrate Okta as an IdP.

Set up Okta as your IdP

To set up Okta as your IdP:

  1. In your Okta dashboard, choose Applications from the menu.

  2. Click Add Application.

    Okta Applications

  3. On the Add Application card click Create New App.

    Okta Add Application card

  4. On the Create a New Application Integration card, select OpenID Connect as the Sign on method.

    Okta Create a New Application Integration card

  5. Click Create.

    The Create OpenID Connect Integration card displays.

    Create OpenID Connect Integration card

  6. In the Login redirect URIs field enter your authorization domain, and include this callback at the end of the path: /cdn-cgi/access/callback.

    Tip: You can find your organization’s authorization domain in Cloudflare Access. It begins with a subdomain unique to your organization and ends with the domain, including the callback path specified above.

  7. Click Save.

    The completed application page displays.

    Okta Settings Sign On Methods card

  8. Scroll to the OpenID Connect Token section and click Edit.

    The OpenID Connect ID Token card displays.

    OpenID Connect ID Token card

  9. Scroll to the Groups claim filter field, switch Starts with to Regex, and enter .* in the field on the right.

  10. Click Save.

  11. Select the General tab.

    The General Settings card displays.

    Okta General Settings card

  12. Scroll to Client Credentials and copy your Client ID and Client Secret.

  13. In Cloudflare Access, scroll to Login Methods, click Add and select the Okta icon.

    Cloudflare Access Login Methods

    The Add a Okta identity provider card displays.

  14. Paste in your copied Client ID and Client secret.

    Cloudflare Access Add a Okta identity provider card

  15. In the Okta dashboard, click Assign > Assign to Groups.

    Okta Cloudflare Access App card

  16. Create your assignments.

    Okta Assign Cloudflare Access Apps to Groups

  17. Click Done.

    You return to the Cloudflare Access App card.

    Okta Cloudflare Access App card

  18. In Cloudflare Access scroll to Access Policies and click Create Access Policy.

  19. In the Property fields, select the appropriate Property type, specify your Okta groups and users, and select Allow in the Permission drop-down list.

    Cloudflare Create Access Policy card

  20. Click Save.

  21. On the Login Methods card, click Save and test.

    On successful connection to your Okta IdP, a confirmation displays.

    Successful connection to your IdP

Example API Configuration

{    "config": {        "client_id": "<your client id>",        "client_secret": "<your client secret",        "okta_account": "",    },    "type": "okta",    "name": "my example idp"}