Zendesk
This guide covers how to configure Zendesk ↗ as a SAML application in Cloudflare Zero Trust.
- An identity provider configured in Cloudflare Zero Trust
 - Admin access to your Zendesk account
 
- 
Go to your Zendesk administrator dashboard, typically available at
<yourdomain>.zendesk.com/admin/security/sso. - 
In a separate tab or window, open Zero Trust ↗, select your account, and go to Access > Applications.
 - 
Select Add an application, then choose SaaS.
 - 
Input the following values in the Zero Trust application configuration:
Zero Trust field Value Entity ID https://<yoursubdomain>.zendesk.comAssertion Consumer Service URL contents of SAML SSO URL in Zendesk account Name ID Format Email  - 
(Optional) Configure these Attribute Statements to include a user's first and last name:
Cloudflare attribute name IdP attribute value <first name>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname<last name>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameZendesk will use the user's email address as their name ↗ if the name is not provided.
 - 
To determine who can access Zendesk, create an Access policy.
 - 
Copy the values from the Cloudflare IdP fields and add them to the following Zendesk fields:
Cloudflare IdP field Zendesk field SSO Endpoint SAML SSO URL Public Key (transformed to fingerprint) Certificate Fingerprint To transform the public key into a fingerprint, use a fingerprint calculator ↗:
- 
Copy the public key value and paste it into X.509 cert.
 - 
Wrap the value with
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----. - 
Set Algorithm to SHA256 and select Calculate Fingerprint.
 - 
Copy the Formatted FingerPrint value.
 
 - 
 - 
Go to
https://<yourdomain>.zendesk.com/admin/security/staff_membersand enable External Authentication > Single Sign On. 
Users should now be able to log in to Zendesk if their Email address exists in the Zendesk user list.