apps/docs/content/guides/integrate/services/cloudflare-oidc.mdx
import CreateApp from "../application/_application.mdx";
This guide shows how to configure ZITADEL as OpenID Connect identity provider for Cloudflare Zero Trust.
Prerequisites:
Make sure to enable "User Info inside ID Token" on your application settings.
<Callout> Cloudflare will return an error "User email was not returned. API permissions are likely incorrect". Enable to send the user information inside the token on your application settings. </Callout>https://${CUSTOM_DOMAIN}/.well-known/openid-configuration for the urls. As mentioned in the Cloudflare docs the Certificate Url is jwks_uri.{
"config": {
"client_id": "<your client id>",
"client_secret": "<your client secret>",
"auth_url": "https://${CUSTOM_DOMAIN}.zitadel.cloud/oauth/v2/authorize",
"token_url": "https://${CUSTOM_DOMAIN}.zitadel.cloud/oauth/v2/token",
"certs_url": "https://${CUSTOM_DOMAIN}.zitadel.cloud/oauth/v2/keys",
"scopes": ["openid", "email", "profile"],
"pkce_enabled": false,
},
"type": "oidc",
"name": "Generic Google"
}