Skip to content
Cloudflare Docs

SCIM provisioning

Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by using the System for Cross-domain Identity Management (SCIM) protocol. This allows you to connect an external identity provider (IdP) to Cloudflare, quickly onboard and manage user permissions. Currently, SCIM provisioning has been integrated with Okta and Microsoft Entra.

Objectives

Once the SCIM provisioning is enabled:

  • A Cloudflare account can receive user group provisioning from the identity provider.
  • Members of each user group can be assigned one or more policies. Each policy defines one or more roles applied to all group members thereof.
  • Members can belong to multiple user groups, and each group can also be configured with different policies.
  • Policies provisioned via SCIM can coexist with policies configured via the traditional setup.

Expected behaviors

Expectations for user lifecycle management with SCIM:

Expected Cloudflare dash behaviorIdentity provider action
User is added to account as memberAssign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken.
User is removed from account as memberUnassign the user from the SCIM application.
Add role to userAdd the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member.
Remove role from userRemove the user from the corresponding group in the IdP.
Retain user in account but with no permissionsRemove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access.

Limitations

  • If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.

Prerequisites

  • Cloudflare dashboard SCIM provisioning is only available to Enterprise customers using Okta or Microsoft Entra.
  • You must be a Super Administrator for the initial setup.
  • In the identity provider, you must have the ability to create applications and groups.

Gather the required data

To start, you will need to collect a couple of pieces of data from Cloudflare and set these aside for later use.

Get the Account ID

The account ID can be found via dashboard or API. For more information, refer to Find account and zone IDs.

Create an API token

  1. Create an API token with the following permissions:

    TypeItemPermission
    AccountSCIM ProvisioningEdit
  2. Under Account Resources, select the specific account to include or exclude from the dropdown menu, if applicable.

  3. Select Continue to summary.

  4. Validate the permissions and select Create Token.

  5. Copy the token value.