Provision Cloudflare with SCIM
By connecting a System for Cross-domain Identity Management (SCIM) provider, you can provision access to the Cloudflare dashboard on a per-user basis.
Currently, we only provide SCIM support for Azure Active Directory and Okta in Self-Hosted Access applications.
For more information about SCIM support, refer to the Announcing SCIM support for Cloudflare Access & Gateway blog post.
This guide will use Okta as the SCIM provider.
 Limitations
- You cannot automatically deprovision users under domains that do not have the SSO connector.
- You cannot update user attributes from the SCIM provider.
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
- Currently, we do not support Okta Integration Network (OIN) integration. This integration is in review.
 Before you begin
- In Cloudflare, Super Administrator access on the account that maintains your SSO.
- In Okta, access to the Create groupsandManage applicationspermissions.
 Create an API token
- Create an API token with the following permissions: - Type - Item - Permission - Account - Account Settings - Read - Account - Account Settings - Edit - User - Memberships - Read - User - Memberships - Edit 
- Add the following under Account Resources: - Action - Account - Include - <account name> 
- Copy the token value. 
 Assign Cloudflare users to an Okta group
- In the Okta dashboard, go to Directory > Groups.
- Select Add a group and enter a name. Select Save.
- Select the group you created.
- Select Assign people and add your users.
- Select Done.
 Set up the Okta application
- Create your Okta SCIM application. - In the Okta dashboard, go to Applications > Applications. 
- Select Browse App Catalog. 
- Locate and select SCIM 2.0 Test App (OAuth Bearer Token). 
- Select Add Integration and name your integration. 
- Enable the following options: - Do not display application icon to users
- Do not display application icon in the Okta Mobile App
 
- Disable Automatically log in when user lands on login page. 
- Select Next, then select Done. 
 
- Integrate the Cloudflare API. - In your integration page, go to Provisioning > Configure API Integration.
- Enable Enable API Integration.
- In SCIM 2.0 Base Url, enter https://api.cloudflare.com/client/v4/accounts/<your_account_ID>/scim/v2.
- In OAuth Bearer Token, enter your API token value.
- Disable Import Groups.
- Select Save.
 
- Set up your SCIM users. - In Provisioning to App, select Edit.
- Enable Create Users and Deactivate Users. Select Save.
- In the integration page, go to Assignments > Assign > Assign to Groups.
- Assign users to your Cloudflare group.
- Select Done.
 
 Configure user permissions
- In the tab bar, go to Provisioning. Select Edit. 
- Enable Create Users and Deactivate Users. Select Save. 
- Select Add group and add groups with the following names: - Administrator Read Only
- Administrator
- Billing
- Super Administrator - All Privileges
 
- Go to Push Groups and select the gear icon. 
- Disable Rename groups. Select Save. 
- Within the Push Groups tab, select Push Groups. 
- Add the groups you created. 
- Select Save. 
Adding any users to these groups will grant them the role. Removing the users from the identity provider will remove them from the associated role.