Cloudflare Docs
Cloudflare Zero Trust
Edit this page on GitHub
Set theme to dark (⇧+D)

Connect to Salesforce through Access (SAML)

This guide covers how to configure Salesforce as a SAML application in Cloudflare Zero Trust.

​​ Prerequisites

  • Admin access to a Salesforce account

​​ 1. Add a SaaS application to Cloudflare Zero Trust

  1. In Zero Trust, go to Access > Applications.
  2. Select SaaS.
  3. For Application, select Salesforce.
  4. For the authentication protocol, select SAML.
  5. Select Add application.
  6. Fill in the following fields:
    • Entity ID: https://<your-domain>.my.salesforce.com
    • Assertion Consumer Service URL: https://<your-domain>.my.salesforce.com
    • Name ID format: Email
  7. Copy the SSO endpoint, Access Entity ID or Issuer, and Public key.
  8. Select Save configuration.
  9. Configure Access policies for the application.
  10. Select Done.

​​ 2. Create a certificate file

  1. Paste the Public key in a text editor.
  2. Wrap the certificate in -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
  3. Set the file extension as .crt and save.

​​ 3. Add a SAML SSO provider to Salesforce

  1. In Salesforce, go to Setup.
  2. In the Quick Find box, enter single sign-on and select Single Sign-On Settings.
  3. In SAML Single Sign-On Settings, select New.
  4. Fill in the following fields:
    • Name: Name of the SSO provider (for example, Cloudflare Access). Users will select this name when signing in to Salesforce.
    • API name: (this will pre-populate)
    • Issuer: https://<your-team-name>.cloudflareaccess.com, where <your-team-name> is your team name.
    • Identity Provider Certificate: Upload the .crt certificate file from 2. Create a certificate file.
    • EntityID: https://<your-domain>.my.salesforce.com
    • SAML Identity type: If the user’s Salesforce username is their email address, select Assertion contains the User’s Salesforce username. Otherwise, select Assertion contains the Federation ID from the User object and make sure the user’s Federation ID matches their email address.
      Configure Federation IDs
      1. In the Quick Find box, enter users and select Users.
      2. Select the user.
      3. Verify that the user’s Federation ID matches the email address used to authenticate to Cloudflare Access.
    • Identity Provider Login URL: SSO endpoint provided in Cloudflare Zero Trust for this application.
  5. Select Save.

​​ 4. Enable Single Sign-On in Salesforce

  1. Enable Cloudflare Access as an identity provider on your Salesforce domain:

    1. In the Quick Find box, enter domain and select My Domain.
    2. In Authentication Configuration, select Edit.
    3. In Authentication Service, turn on the Cloudflare Access provider.
  2. Configure Single Sign-On settings:
    1. In the Quick Find box, enter single sign-on and select Single Sign-On Settings.
    2. (Optional) To require users to login with Cloudflare Access, turn on Disable login with Salesforce credentials.
    3. Turn on SAML Enabled.
    4. Turn on Make federation ID case-insensitive.