Digicert
  Last reviewed:  4 months ago  
    This guide covers how to configure Digicert ↗ as a SAML application in Cloudflare Zero Trust.
- An identity provider configured in Cloudflare Zero Trust
 - Admin access to a Digicert account
 - SAML ↗ enabled in your Digicert account
 
- In Zero Trust ↗, go to Access > Applications.
 - Select Add an application > SaaS > Select.
 - For Application, enter 
Digicertand select the corresponding textbox that appears. - For the authentication protocol, select SAML.
 - Select Add application.
 - Fill in the following fields:
- Entity ID: 
https://www.digicert.com/account/sso/metadata - Assertion Consumer Service URL: 
https://www.digicert.com/account/sso/ - Name ID format: Email
 
 - Entity ID: 
 - Copy the SAML Metadata endpoint.
 - Select Save configuration.
 - Configure Access policies for the application.
 - Select Done.
 
- In Digicert, select Settings > Single Sign-On > Set up SAML.
 - Under How will you send data from your IDP?, turn on Use a dynamic URL.
 - Under Use a dynamic URL, paste the SAML Metadata endpoint from application configuration in Cloudflare Zero Trust.
 - Under How will you identify a user?, turn on NameID.
 - Under Federation Name, enter a name (for example, 
Cloudflare Access). Your users will select this name when signing in. - Select Save SAML Settings.
 
- In Digicert, select Settings > Single Sign-On.
 - Copy the SP Initiated Custom SSO URL.
 - Paste the URL into an incognito browser window and sign in. Upon successful sign in, SAML SSO is fully enabled.
 - (Optional) By default, users can choose to sign in directly or with SSO. To require SSO sign in, go to Account > Users. Turn on Only allow this user to log in through SAML/OIDC SSO in the user details of the desired user.