Cloudflare Docs
Cloudflare Zero Trust
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)


Centrify secures access to infrastructure, DevOps, cloud, and other modern enterprise so you can prevent the number one cause of breaches: privileged access abuse.

​​ Set up Centrify

These steps help you set up Centrify as your identity provider:

  1. Log in to the Centrify administrator panel.

  2. Click Apps.

  3. Click Add Web Apps.

  4. Select the Custom tab and click Add OpenID Connect.

  5. On the Add Web App screen click Yes to create an OpenID Connect application.

  6. Enter an Application ID.

    Centrify Settings with Application ID added

  7. Click Save.

  8. Click Trust in the Settings menu.

  9. Enter a strong application secret on the Trust section.

  10. Under Service Provider Configuration enter your application’s authentication domain as the resource application URL.

  11. Under Authorized Redirect URIs click Add.

  12. Under Authorized Redirect URIs enter your team domain followed by this callback at the end of the path: /cdn-cgi/access/callback. For example:


    Centrify Trust Identity Provider Configuration with team domain and callback

  13. Click Save.

  14. Take note of the Client ID, Client Secret, OpenID Connect Issuer URL, and Application ID from the Settings tab.

  15. Navigate to the User Access tab.

  16. Select the roles to grant access to your application.

  17. In Zero Trust, navigate to Settings > Authentication.

  18. Under Login methods, click Add new.

  19. Paste in the Client ID, Client Secret, Centrify account URL and Application ID.

  20. Click Save.

To test that your connection is working, navigate to Authentication > Login methods and click Test next to the login method you want to test.

​​ Example API Config

"config": {
"client_id": "<your client id>",
"client_secret": "<your client secret>",
"centrify_account": "",
"centrify_app_id": "exampleapp"
"type": "centrify",
"name": "my example idp"