Cloudflare Docs
Cloudflare-One
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

OneLogin OIDC

OneLogin provides SSO identity management. Cloudflare Access supports OneLogin as an OIDC identity provider.

Set up OneLogin OIDC

To set up OneLogin as your identity provider:

  1. Log in to your OneLogin admin portal.

  2. Select Apps > Custom Connectors.

    OneLogin OIDC

    The Custom Connectors card displays.

  3. Click New Connector.

  4. Name the connector. The connector name card displays. Our example uses access-oidc for the connector name.

    OneLogin OIDC Application Basic Configuration page

  5. In Sign-On Method, select the OpenID Connect option.

  6. In the Redirect URI field, enter your team domain followed by this callback at the end of the path: /cdn-cgi/access/callback. For example:

    https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
    
  7. Click Save.

  8. Select More Actions > Add App to Connector.

    OneLogin OIDC Application Basic Configuration page More Actions menu

  9. In the Portal section, enter a name for your application in the Display Name field.

  10. Click Save.

  11. Select the Access tab.

    OneLogin OIDC Add Application Access page

  12. Add the Roles that can access this application.

  13. Select the SSO tab.

    OneLogin OIDC Add Application SSO page

  14. Click Show client secret.

  15. Copy both the Client ID and Client Secret.

  16. On the Zero Trust dashboard, navigate to Settings > Authentication.

  17. Under Login methods, click Add new.

  18. Select Centrify as your IdP.

  19. Paste in your copied Client ID and Client secret.

  20. Click Save.

To test that your connection is working, navigate to Authentication > Login methods and click Test next to OneLogin.

Example API Config

{
  "config": {
    "client_id": "<your client id>",
    "client_secret": "<your client secret>",
    "onelogin_account": "https://mycompany.onelogin.com"
  },
  "type": "onelogin",
  "name": "my example idp"
}