Skip to content
  • There are no suggestions because the search field is empty.

Streamlined Actions V2 deployment to Cloudflare Workers

Instantly spin up ready-to-run Cloudflare Worker examples to explore ZITADEL Actions V2

This repository provides a collection of ready-to-deploy Cloudflare Worker examples designed to help you experiment with ZITADEL Actions V2:

Each example demonstrates a common scenario — such as injecting custom claims, forwarding events, or mapping IDP attributes — and can be deployed to your Cloudflare account with the deployment utility

All the examples provided include the functionality to validate the HMAC signature sent by Zitadel to authenticate the webhook request.

 A minimal vanilla JS app can be used to login and decode the user tokens to demonstrate the final result:

To call the Zitadel API to create the Targets, you can use the Zitadel Postman collection:


1. Prepare the environment

2. Deploy the script to Cloudflare

  • Deploy a sample script from the repository with the deployment utility, following the configuration guide, this example will show you how to add a custom claim to the access token. 

3. Login with a sample user and inspect the token claims

  • In the Access Token box, you should see the following custom claim:
    • "group": "ADMIN"

Feel free to experiment with the code, adjust the logic, or extend it with your own use cases. Each example is built to be simple, modular, and easy to customize — perfect for learning how ZITADEL Actions V2 integrate with Cloudflare Workers.

Don’t forget to explore the other examples in the repository.