Cloudflare Docs
Cloudflare Zero Trust
Edit this page
Report an issue with this page
Log into the Cloudflare dashboard
Set theme to dark (⇧+D)

Connect to Digicert through Access (SAML)

This guide covers how to configure Digicert as a SAML application in Cloudflare Zero Trust.

​​ Prerequisites

​​ 1. Add a SaaS application to Cloudflare Zero Trust

  1. In Zero Trust, go to Access > Applications.
  2. Select Add an application > SaaS > Select.
  3. For Application, type Digicert and select the textbox that appears below.
  4. For the authentication protocol, select SAML.
  5. Select Add application.
  6. Fill in the following fields:
    • Entity ID: https://www.digicert.com/account/sso/metadata
    • Assertion Consumer Service URL: https://www.digicert.com/account/sso/
    • Name ID format: Email
  7. Copy the SAML Metadata endpoint.
  8. Select Save configuration.
  9. Configure Access policies for the application.
  10. Select Done.

​​ 2. Add a SAML SSO provider in Digicert

  1. In Digicert, select Settings > Single Sign-On > Set up SAML.
  2. Under How will you send data from your IDP?, turn on Use a dynamic URL.
  3. Under Use a dynamic URL, paste the SAML Metadata endpoint from application configuration in Cloudflare Zero Trust.
  4. Under How will you identify a user?, turn on NameID.
  5. Under Federation Name, enter a name (for example, Cloudflare Access). Your users will select this name when signing in.
  6. Select Save SAML Settings.

​​ 3. Test and Enable SSO in Digicert

  1. In Digicert, select Settings > Single Sign-On.
  2. Copy the SP Initiated Custom SSO URL.
  3. Paste the URL into an incognito browser window and sign in. Upon successful sign in, SAML SSO is fully enabled.
  4. (Optional) By default, users can choose to sign in directly or with SSO. To require SSO sign in, go to Account > Users. Turn on Only allow this user to log in through SAML/OIDC SSO in the user details of the desired user.