Skip to content

Commit 1b4edb3

Browse files
Update src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent 3b2b2c0 commit 1b4edb3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -456,7 +456,7 @@ And now let's define the policy.
456456

457457
Inside the policy, we've made this application available to our new access group for IT Admins. Under "Require," we're enforcing the use of Cloudflare WARP specifically (as opposed to only Cloudflare Gateway); the user must be on a company-managed device, with an active device client that's authenticated to the company's instance of Cloudflare, MFA must be used during login, and there is an additional option below for external evaluation.
458458

459-
[External evaluation](/cloudflare-one/policies/access/external-evaluation/) means we have an API endpoint containing some sort of [access logic](https://github.com/cloudflare/workers-access-external-auth-example) — in this case, time of day access. Were making an API call to this endpoint, and defining the key that Cloudflare is using to verify that the response came from the API. This is useful for several reasons:
459+
[External evaluation](/cloudflare-one/policies/access/external-evaluation/) means we have an API endpoint containing some sort of [access logic](https://github.com/cloudflare/workers-access-external-auth-example) — in this case, time of day access. We're making an API call to this endpoint, and defining the key that Cloudflare is using to verify that the response came from the API. This is useful for several reasons:
460460

461461
External evaluation allows users to create bespoke security posture checks based on criteria that may not be covered by the default set of posture checks. For this example, we'd be using a service built on [Cloudflare Workers](https://workers.cloudflare.com/).
462462
- Restricting access to the terminal outside of business hours implements a form of time-based access control. This adds an extra layer of security by limiting the window of opportunity for potential attackers.

0 commit comments

Comments
 (0)