Skip to main content

Configure Identity Provider

Task

Integrate a SAML-based Identity Provider (IdP) with Cloudflare One so that Access and MCP portal authentication work in later modules.

Why

Cloudflare Access verifies user identity but does not manage users directly. It relies on Identity Providers (IdPs) to do so. By integrating Access with a SAML IdP, you provide a list of authorized users that Access can verify against.

This IdP is used later for:

  • Access policies (M0)
  • CF1 Client enrollment (M0)
  • MCP portal authentication (M5)
info

Cloudflare Access refers to the suite of products that manage access control policies and identity provider integrations.

What You Are Configuring

  • A SAML identity provider in your Zero Trust organization

Step 1: Log in and Open the Cloudflare One Dashboard

  1. Open dash.cloudflare.com
  2. Log in with your lab credentials
  3. Navigate to the Cloudflare One dashboard (or open dash.cloudflare.com/one)

Cloudflare One dashboard


Step 2: Verify Your Team Domain Prefix

  1. In your Cloudflare One dashboard, navigate to Settings Settings page
  2. Verify that your Team domain is set — it will be based on your lab slug:
<your-slug>.cloudflareaccess.com

For example: adjective-noun.cloudflareaccess.com

Team domain uniqueness

The Team domain must be unique across Cloudflare. If the domain for your lab slug was already taken, a random suffix will be added (e.g., adjective-noun-1234.cloudflareaccess.com).

If this is the case, include this random suffix in your slug when setting up the SAML provider in the next step.

warning

If you don't see a team domain set up, you are probably not using the lab account created for you. Double-check:

  1. You received the Cloudflare account invite email and accepted it
  2. You have switched to your lab account in the Cloudflare dashboard

Step 3: Create the SAML Provider

  1. Open this URL: https://labs.cloudflare.com/saml/register

  2. Paste in your lab slug (e.g., adjective-noun) SAML registration

  3. Click "Register new SAML provider"

  4. The page will generate a SAML provider for your organization SAML download

  5. Download the SAML metadata file by clicking the provided link


Step 4: Add the SAML IdP to Your Account

  1. Return to the Cloudflare One dashboard
  2. Open Integrations > Identity providers
  3. Select + Add an identity provider
  4. In the Login methods card, select SAML
  5. Drag and drop the metadata file you downloaded in Step 3 into the Import box

Import metadata


Step 5: Save and Test

  1. Scroll down and click Save
  2. Click Test
info

It may take up to 60 seconds for the new SAML provider to be provisioned. If you receive an error indicating the SAML provider was not found, wait a moment and retry.

  1. If prompted to log in, use the following credentials:
FieldValue
Emailitadmin@acmecorp.com
Password#Savetheinternet
  1. Press Continue

Expected Result

You should see your user's identity successfully retrieved via the SAML callback. The test page shows the user's email, SAML attributes, and authentication status.

Test successful


Test Accounts

The shared SAML IdP includes the following test accounts for this lab:

EmailPasswordRole
itadmin@acmecorp.com#SavetheinternetIT administrator
employee@acmecorp.com#SavetheinternetRegular employee

Validation

  • Team domain verified in Settings
  • SAML provider created at labs.cloudflare.com/saml/register
  • Metadata file downloaded
  • SAML IdP added in Integrations > Identity providers
  • Test login succeeds with itadmin@acmecorp.com
  • User identity retrieved in the SAML callback

Troubleshooting

SAML provider not found error
  • Wait 60 seconds after creating the provider and retry
  • Verify you used the correct slug (including any random suffix if your team domain has one)
Login loop or redirect error
  • Clear browser cookies for cloudflareaccess.com and your lab domain
  • Try an incognito window
  • Verify the metadata file was imported correctly
Team domain not visible
  • Ensure you accepted the Cloudflare account invite email
  • Switch to the correct lab account in the dashboard account selector
Invalid certificate error
  • Re-download the metadata file from labs.cloudflare.com/saml/register
  • Delete the existing IdP entry and re-add it with the fresh metadata file