Skip to content

Commit 0ff7ff1

Browse files
authored
Updated based on gemini prompt recommendations
1 parent 0cd15c3 commit 0ff7ff1

File tree

2 files changed

+19
-13
lines changed

2 files changed

+19
-13
lines changed

src/content/changelog/access/2025-09-22-Access-Application-Support-For-All-Ports-And-Protocols.mdx

Lines changed: 0 additions & 13 deletions
This file was deleted.
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Access private hostname applications support all ports/protocols
3+
description: Cloudflare Access for private hostname applications can now secure traffic on all ports and protocols. 🔒
4+
date: 2025-10-28
5+
products:
6+
- access
7+
---
8+
9+
[Cloudflare Access for private hostname applications](cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) can now secure traffic on all ports and protocols. 🔒
10+
11+
Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port 443 and support Server Name Indicator (SNI).
12+
13+
This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controls—like single sign-on (SSO), MFA, device posture, and variable session lengths—to any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTP applications.
14+
15+
![Example private application on non-443 port](~/assets/images/changelog/access/internal_private_app_any_port.png)
16+
17+
For example, you can now create a self-hosted application in Access for ssh.testapp.local running on port 22. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.
18+
19+
This feature is generally available across all plans.

0 commit comments

Comments
 (0)