Skip to content

Commit 02208fd

Browse files
[CF1] KEXalgo support list (#20132)
* [CF1] KEXalgo support list * Update src/content/docs/cloudflare-one/applications/non-http/index.mdx * fixed formatting
1 parent 3920f35 commit 02208fd

File tree

2 files changed

+23
-11
lines changed

2 files changed

+23
-11
lines changed

src/content/docs/cloudflare-one/applications/non-http/browser-rendering.mdx

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ pcx_content_type: how-to
33
title: Browser-rendered terminal
44
sidebar:
55
order: 3
6-
76
---
87

98
Cloudflare can render certain non-web applications in your browser without the need for client software or end-user configuration changes. Cloudflare currently supports rendering a terminal for SSH and VNC connections in a user's browser.
@@ -16,11 +15,24 @@ You can only enable browser rendering on domains and subdomains, not for specifi
1615

1716
To enable browser rendering:
1817

19-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
20-
2. Locate the SSH or VNC application you created when [connecting the server to Cloudflare](/cloudflare-one/connections/connect-networks/use-cases/ssh/). Select **Configure**.
21-
3. In the **Policies** tab, ensure that only **Allow** or **Block** policies are present. **Bypass** and **Service Auth** are not supported for browser-rendered applications.
22-
4. Go to **Advanced settings** > **Browser rendering settings**.
23-
5. For **Browser rendering**, choose _SSH_ or _VNC_.
24-
6. Select **Save application**.
18+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
19+
2. Locate the SSH or VNC application you created when [connecting the server to Cloudflare](/cloudflare-one/connections/connect-networks/use-cases/ssh/). Select **Configure**.
20+
3. In the **Policies** tab, ensure that only **Allow** or **Block** policies are present. **Bypass** and **Service Auth** are not supported for browser-rendered applications.
21+
4. Go to **Advanced settings** > **Browser rendering settings**.
22+
5. For **Browser rendering**, choose _SSH_ or _VNC_.
23+
24+
:::note
25+
26+
When connecting over SSH, Cloudflare supports following key exchange algorithms:
27+
28+
29+
- `curve25519-sha256`
30+
- `ecdh-sha2-nistp256`
31+
- `ecdh-sha2-nistp384`
32+
- `ecdh-sha2-nistp521`
33+
34+
:::
35+
36+
6. Select **Save application**.
2537

2638
When users authenticate and visit the URL of the application, Cloudflare will render a terminal in their browser.

src/content/docs/cloudflare-one/applications/non-http/index.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ pcx_content_type: concept
33
title: Non-HTTP applications
44
sidebar:
55
order: 1
6-
76
---
87

98
Cloudflare offers both client-based and clientless ways to grant secure access to non-HTTP applications.
@@ -17,6 +16,7 @@ Non-HTTP applications require [connecting your private network](/cloudflare-one/
1716
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access any private route unless they are protected by an Access policy or Gateway firewall rule. To secure the application, you can [create a self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/policies/access/) that allow or block specific users.
1817

1918
If you would like to define how users access specific infrastructure servers within your network, [create an infrastructure application](/cloudflare-one/applications/non-http/infrastructure-apps/) in Access for Infrastructure. Access for Infrastructure provides an additional layer of control and visibility over how users access non-HTTP applications, including:
19+
2020
- Define fine-grained policies to govern who has access to specific servers and exactly how a user may access that server.
2121
- Eliminate SSH keys by using short-lived certificates to authenticate users.
2222
- Export SSH command logs to a storage service or SIEM solution using [Logpush](/cloudflare-one/insights/logs/logpush/).
@@ -41,6 +41,6 @@ Users can log in to the application by installing `cloudflared` on their device
4141

4242
To connect to an application over a specific protocol, refer to these tutorials:
4343

44-
* [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/)
45-
* [SMB](/cloudflare-one/connections/connect-networks/use-cases/smb/)
46-
* [RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/)
44+
- [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/)
45+
- [SMB](/cloudflare-one/connections/connect-networks/use-cases/smb/)
46+
- [RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/)

0 commit comments

Comments
 (0)