Access gated by elevated Entra group membership, synchronised to Cloudflare via SCIM provisioning.
Loading...
This page works identically to Group A at the technical level — SCIM provisioning syncs group membership from Entra, and the Cloudflare Access policy permits only members of CF-Demo-Group-B.
The intent is to demonstrate tiered access: Group A represents a broader, restricted-scope set of users, while Group B represents a smaller elevated-access group. A user in Group A cannot reach this page unless they are also in Group B.
In a real deployment this pattern maps to role separation — e.g. standard staff vs administrators, or read-only vs read-write access to a tool.
/scim-a/ but are denied here. This validates that the SCIM sync and group policy are working as intended.CF-Demo-Group-B, assign only the elevated-access membersCF-Demo-Group-B to the application scopebarbicancloud.co.uk/scim-b/* (path) or scim-b.barbicancloud.co.uk (subdomain)CF-Demo-Group-BThe SCIM token and provisioning setup is shared with Group A — no additional token is needed.
barbicancloud.co.uk/scim-b/scim-b.barbicancloud.co.uk