Okta
Okta provides cloud software that helps companies manage and secure user authentication to modern applications, and helps developers build identity controls into applications, website web services, and devices. You can integrate Okta with Cloudflare Zero Trust and build rules based on user identity and group membership. Cloudflare Zero Trust supports Okta integrations using either the OIDC (default) or SAML protocol.
Additionally, you can configure Okta to use risk information from Zero Trust user risk scores to create SSO-level policies. For more information, refer to Send risk score to Okta.
-
On your Okta admin dashboard, go to Applications > Applications.
-
Select Create App Integration.
-
For the Sign-in method, select OIDC - OpenID Connect.
-
For the Application type, select Web Application. Select Next.
-
Enter any name for the application. In the Sign-in redirect URIs field, enter the following URL:
You can find your team name in Zero Trust under Settings > Custom Pages.
-
Choose the desired Assignment option and select Save.
-
From the application view, go to the Sign On tab.
-
Scroll down to the OpenID ConnectID Token and select Edit.
-
Set the Groups claim filter to Matches regex and its value to
.*
. -
In the General tab, copy the Client ID and Client secret.
-
In Zero Trust ↗, go to Settings > Authentication.
-
Under Login methods, select Add new. Select Okta as your identity provider.
-
Fill in the following information:
- Name: Name your identity provider.
- App ID: Enter your Okta client ID.
- Client secret: Enter your Okta client secret.
- Okta account URL: Enter your Okta domain ↗, for example
https://my-company.okta.com
.
-
(Optional) Create an Okta API token and enter it in Zero Trust (the token can be read-only). This will prevent your Okta groups from failing if you have more than 100 groups.
-
(Optional) To configure custom OIDC claims:
- In Okta, create a custom authorization server ↗ and ensure that the
groups
scope is enabled. - In Zero Trust, enter the Authorization Server ID obtained from Okta.
- Under Optional configurations, enter the claims that you wish to add to your users' identity. This information will be available in the user identity endpoint
- In Okta, create a custom authorization server ↗ and ensure that the
-
(Optional) Enable Proof of Key Exchange (PKCE) ↗. PKCE will be performed on all login attempts.
-
Select Save.
To test that your connection is working, select Test.
The Okta integration allows you to synchronize IdP groups and automatically deprovision users using SCIM. To enable SCIM provisioning between Access and Okta, you need two separate app integrations in Okta:
- The Okta OIDC connector you created when adding Okta as an identity provider.
- A second Okta application of type SCIM 2.0 Test App (Header Auth). This is technically a SAML app but is responsible for sending user and group info via SCIM.
-
In Zero Trust ↗, go to Settings > Authentication.
-
Find the Okta integration and select Edit.
-
Turn on Enable SCIM.
-
(Optional) Configure the following settings:
- Enable user deprovisioning: Revoke a user's active session when they are removed from the SCIM application in Okta. This will invalidate all active Access sessions and prompt for reauthentication for any WARP session policies.
- Remove user seat on deprovision: Remove a user's seat from your Zero Trust account when they are removed from the SCIM application in Okta.
- SCIM identity update behavior: Choose what happens in Zero Trust when the user's identity updates in Okta.
- Automatic identity updates: Automatically update the User Registry identity when Okta sends an updated identity or group membership through SCIM. This identity is used for Gateway policies and WARP device profiles; Access will read the user's updated identity when they reauthenticate.
- Group membership change reauthentication: Revoke a user's active session when their group membership changes in Okta. This will invalidate all active Access sessions and prompt for reauthentication for any WARP session policies. Access will read the user's updated group membership when they reauthenticate.
- No action: Update the user's identity the next time they reauthenticate to Access or WARP.
-
Select Save.
-
Copy the SCIM Endpoint and SCIM Secret. You will need to enter these values into Okta.
The SCIM secret never expires, but you can manually regenerate the secret at any time.
-
On your Okta admin dashboard, go to Applications > Applications.
-
Select Browse App Catalog.
-
Search for
SCIM Header Auth
and select SCIM 2.0 Test App (Header Auth). -
Select Add Integration.
-
On the General Settings tab, name your application and select Next.
-
On the Sign-on Options tab, ensure that SAML 2.0 is selected. Select Done to create the integration.
-
On the Provisioning tab, select Configure API Integration.
-
Select Enable API integration.
-
In the Base URL field, enter the SCIM Endpoint obtained from Zero Trust.
-
In the API Token field, enter the SCIM Secret obtained from Zero Trust.
-
Select Test API Credentials to ensure that the credentials were entered correctly. Select Save.
-
On the Provisioning tab, select Edit and enable:
- Create Users
- Update User Attributes
- Deactivate Users
-
Select Save to complete the configuration.
-
In the Assignments tab, add the users you want to synchronize with Cloudflare Access. You can add users in batches by assigning a group. If a user is removed from the application assignment via a either direct user assignment or removed from the group that was assigned to the app, this will trigger a deprovisioning event from Okta to Cloudflare.
-
In the Push Groups tab, add the Okta groups you want to synchronize with Cloudflare Access. These groups will display in the Access policy builder and are the group memberships that will be added and removed upon membership change in Okta.
To verify the integration, select View Logs in the Okta SCIM application.
To check if a user's identity was updated in Zero Trust, view their User Registry identity.