Files
authentik/website/integrations/services/cloudflare-access/index.mdx
dependabot[bot] 3996bdac33 website: Bump prettier from 3.3.3 to 3.4.1 in /website (#12205)
* website: Bump prettier from 3.3.3 to 3.4.1 in /website

Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1.
- [Release notes](https://github.com/prettier/prettier/releases)
- [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md)
- [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1)

---
updated-dependencies:
- dependency-name: prettier
  dependency-type: direct:development
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

* update formatting

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* sigh

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* disable flaky test

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2024-11-27 15:14:19 +01:00

68 lines
2.5 KiB
Plaintext

---
title: Integrate with Cloudflare Access
sidebar_label: Cloudflare Access
---
# Cloudflare Access
<span class="badge badge--secondary">Support level: Community</span>
## What is Cloudflare Access
> Cloudflare Access is a secure, cloud-based zero-trust solution for managing and authenticating user access to internal applications and resources.
>
> -- https://www.cloudflare.com/zero-trust/products/access/
## Preparation
The following placeholders will be used:
- `mysubdomain.cloudflareaccess.company` is the FQDN of your Cloudflare Access subdomain.
- `authentik.company` is the FQDN of the authentik install.
To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate.
## authentik configuration
### Step 1: Log in to authentik
1. Log in to your authentik instance.
2. Click **Admin interface**.
### Step 2: Create a new authentication provider
3. Under **Application**, click **Providers** and create a new provider.
4. Choose **OAuth2/OpenID Provider** and then click **Next**.
5. Set the authorization flow to **Authorize Application** (`default-provider-authorization-explicit-consent`).
6. Set the client type to **Confidential**.
7. Set the redirect URI to `https://mysubdomain.cloudflareaccess.company/cdn-cgi/access/callback`.
8. Ensure that the signing key is set to **Authentik Self-signed Certificate**.
9. Click **Finish** to create the provider.
### Step 3: Create a new application
10. Create a new application and give it a name.
11. Set the provider to the one you just created.
12. Ensure that the **Policy engine mode** is set to **ANY, any policy must match to grant access**.
13. Click **Create** and then navigate to your [Cloudflare Access dashboard](https://one.dash.cloudflare.com).
## Cloudflare Access configuration
### Step 4: Configure Cloudflare Access
1. Go to the Cloudflare One dashboard.
2. Click **Settings** at the bottom of the menu, then select **Authentication**.
### Step 5: Add a login method
3. From **Login methods** click **Add** and select **OpenID Connect"**
4. Enter a name for your login method. This can be anything.
5. Copy the following details from the authentik provider settings you previously created and paste them into the text boxes:
- **Client ID** -> App ID
- **Client Secret** -> Client Secret
- **Authorize URL** -> Auth URL
- **Token URL** -> Token URL
- **JWKS URL** -> Certificate URL
6. Click **Save**.
7. Click **Test** to verify your login provider.