Tutorial: Configure Cloudflare with Azure Active Directory for secure hybrid access

In this tutorial, learn how to integrate Azure Active Directory (Azure AD) with Cloudflare Zero Trust. Using this solution, you can build rules based on user identity and group membership. Users can authenticate with their Azure AD credentials and connect to Zero Trust protected applications.


To get started, you need:

Integrate organization identity providers with Cloudflare Access

Cloudflare Zero Trust Access helps enforce default-deny, Zero Trust rules that limit access to corporate applications, private IP spaces, and hostnames. This feature connects users faster and safer than a virtual private network (VPN).

Organizations can use multiple Identity Providers (IdPs) simultaneously, reducing friction when working with partners or contractors.

To add an IdP as a sign-in method, configure Cloudflare Zero Trust dashboard and Azure AD.

The following architecture diagram shows the implementation.

Screenshot shows the architecture diagram of Cloudflare and Azure AD integration

Integrate a Cloudflare Zero Trust account with Azure AD

To integrate Cloudflare Zero Trust account with an instance of Azure AD:

  1. On the Cloudflare Zero Trust dashboard, navigate to Settings > Authentication.

  2. For Login methods, select Add new.

    Screenshot shows adding new login methods

  3. Under Select an identity provider, select Azure AD.

    Screenshot shows selecting a new identity provider

  4. The Add Azure ID dialog appears. Enter credentials from your Azure AD instance and make necessary selections.

    Screenshot shows making selections to Azure AD dialog box

  5. Select Save.

Register Cloudflare with Azure AD

Use the instructions in the following three sections to register Cloudflare with Azure AD.

  1. Sign in to the Azure portal.

  2. Under Azure Services, select Azure Active Directory.

  3. In the left menu, under Manage, select App registrations.

  4. Select the + New registration tab.

  5. Name your application and enter your team domain, with callback at the end of the path: /cdn-cgi/access/callback. For example, https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback

  6. Select Register.

    Screenshot shows registering an application

Certificates & secrets

  1. On the Cloudflare Access screen, under Essentials, copy and save the Application (client) ID and the Directory (tenant) ID.

    Screenshot shows cloudflare access screen

  2. In the left menu, under Manage, select Certificates & secrets.

    Screenshot shows Azure AD certificates and secrets screen

  3. Under Client secrets, select + New client secret.

  4. In Description, name the client secret.

  5. Under Expires, select an expiration.

  6. Select Add.

  7. Under Client secrets, from the Value field, copy the value. Consider the value an application password. This example's value is visible, Azure values appear in the Cloudflare Access configuration.

    Screenshot shows cloudflare access configuration for Azure AD


  1. In the left menu, select API permissions.

  2. Select + Add a permission.

  3. Under Select an API, select Microsoft Graph.

    Screenshot shows Azure AD API permissions using MS Graph

  4. Select Delegated permissions for the following permissions:

  • Email

  • openid

  • profile

  • offline_access

  • user.read

  • directory.read.all

  • group.read.all

  1. Under Manage, select + Add permissions.

    Screenshot shows Azure AD request API permissions screen

  2. Select Grant Admin Consent for ....

    Screenshot shows configured API permissions with granting admin consent

  3. On the Cloudflare Zero Trust dashboard, navigate to Settings> Authentication.

  4. Under Login methods, select Add new.

  5. Select Azure AD.

  6. Enter the Application ID, Application secret, and Directory ID values.


    For Azure AD groups, in Edit your Azure AD identity provider, for Support Groups select On.

  7. Select Save.

Test the integration

  1. To test the integration on the Cloudflare Zero Trust dashboard, navigate to Settings > Authentication.

  2. Under Login methods, for Azure AD select Test.

    Screenshot shows Azure AD as the login method for test

  3. Enter Azure AD credentials.

  4. The Your connection works message appears.

    Screenshot shows Your connection works screen

Next steps