Entra ID as identity provider via OAuth 2.0 / OIDC. Cloudflare Access handles the token exchange.
Loading...
When a request hits this page, Cloudflare Access checks for a valid CF_Authorization JWT. If absent or expired, it redirects the user to the Cloudflare login screen, which then redirects to Entra ID using the OAuth 2.0 authorisation code flow.
Entra authenticates the user (MFA if required by Conditional Access), returns an authorisation code to Cloudflare, and Cloudflare exchanges it for an ID token using the client secret. Cloudflare validates the token, applies the Access policy, and if allowed issues its own JWT to the user's browser as a cookie.
From this point, the user's Entra identity (email, name, groups) is available via /cdn-cgi/access/get-identity.
Cloudflare Access — OIDC Demohttps://<your-team>.cloudflareaccess.com/cdn-cgi/access/callbackFrom the app registration overview: Application (client) ID and Directory (tenant) ID. You will need both in Cloudflare.
barbicancloud.co.uk/oidc/* (path) or oidc.barbicancloud.co.uk (subdomain)barbicancloud.co.uk/oidc/oidc.barbicancloud.co.uk