SCIM provisioning
Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by using the System for Cross-domain Identity Management (SCIM) protocol. This allows you to connect an external identity provider (IdP) to Cloudflare, quickly onboard and manage user permissions. Currently, SCIM provisioning has been integrated with Okta and Microsoft Entra.
Once the SCIM provisioning is enabled:
- A Cloudflare account can receive user group provisioning from the identity provider.
- Members of each user group can be assigned one or more policies. Each policy defines one or more roles ↗ applied to all group members thereof.
- Members can belong to multiple user groups, and each group can also be configured with different policies.
- Policies provisioned via SCIM can coexist with policies configured via the traditional setup.
Expectations for user lifecycle management with SCIM:
Expected Cloudflare dash behavior | Identity provider action |
---|---|
User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
User is removed from account as member | Unassign the user from the SCIM application. |
Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
Remove role from user | Remove the user from the corresponding group in the IdP. |
Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
- Cloudflare dashboard SCIM provisioning is only available to Enterprise customers using Okta or Microsoft Entra.
- You must be a Super Administrator for the initial setup.
- In the identity provider, you must have the ability to create applications and groups.
To start, you will need to collect a couple of pieces of data from Cloudflare and set these aside for later use.
The account ID can be found via dashboard or API. For more information, refer to Find account and zone IDs.
-
Create an API token with the following permissions:
Type Item Permission Account SCIM Provisioning Edit -
Under Account Resources, select the specific account to include or exclude from the dropdown menu, if applicable.
-
Select Continue to summary.
-
Validate the permissions and select Create Token.
-
Copy the token value.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Products
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark
-