Streamlined Actions V2 deployment to Cloudflare Workers
Instantly spin up ready-to-run Cloudflare Worker examples to explore ZITADEL Actions V2
This repository provides a collection of ready-to-deploy Cloudflare Worker examples designed to help you experiment with ZITADEL Actions V2:
Each example demonstrates a common scenario — such as injecting custom claims, forwarding events, or mapping IDP attributes — and can be deployed to your Cloudflare account with the deployment utility.
All the examples provided include the functionality to validate the HMAC signature sent by Zitadel to authenticate the webhook request.
A minimal vanilla JS app can be used to login and decode the user tokens to demonstrate the final result:
To call the Zitadel API to create the Targets, you can use the Zitadel Postman collection:
1. Prepare the environment
- If you don’t have one yet, sign up for a Zitadel Cloud instance
- Sign up for a Cloudflare account
- Clone and run the Zitadel JS Quickstart
- Fork the Zitadel Postman Collection and set the environment variables for your Zitadel instance
2. Deploy the script to Cloudflare
- Deploy a sample script from the repository with the deployment utility, following the configuration guide, this example will show you how to add a custom claim to the access token.
3. Login with a sample user and inspect the token claims
- In the Access Token box, you should see the following custom claim:
"group": "ADMIN"
Feel free to experiment with the code, adjust the logic, or extend it with your own use cases. Each example is built to be simple, modular, and easy to customize — perfect for learning how ZITADEL Actions V2 integrate with Cloudflare Workers.
Don’t forget to explore the other examples in the repository.