Skip to content

Commit 1e9792d

Browse files
committed
Fix wording
1 parent f2397d2 commit 1e9792d

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

src/content/docs/cloudflare-one/tutorials/ai-wrapper-tenant-control.mdx

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,21 +7,22 @@ title: Create and secure an AI agent wrapper using AI Gateway and Zero Trust
77

88
import { TabItem, Tabs, Details, Render } from "~/components";
99

10-
This tutorial explains how to use [Cloudflare AI Gateway](/ai-gateway/) and Zero Trust to create a functional and secure AI agent wrapper. Cloudflare Zero Trust administrators can protect access to the wrapper with [Cloudflare Access](/cloudflare-one/policies/access/). Additionally, you can enforce [Gateway policies](/cloudflare-one/policies/gateway/) to control how your users interact with AI agents, including executing AI agents in an isolated browser with [Browser Isolation](/cloudflare-one/policies/browser-isolation/), enforcing [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) profiles to prevent sensitive data exfiltration, and scanning content to avoid answers from AI agents that violate internal corporate guidelines. Creating an AI agent wrapper is also an effective way to enforce tenant control if you have an enterprise plan of a specific AI provider, such as ChatGPT Enterprise.
10+
This tutorial explains how to use [Cloudflare AI Gateway](/ai-gateway/) and Zero Trust to create a functional and secure website wrapper for an AI agent. Cloudflare Zero Trust administrators can protect access to the wrapper with [Cloudflare Access](/cloudflare-one/policies/access/). Additionally, you can enforce [Gateway policies](/cloudflare-one/policies/gateway/) to control how your users interact with AI agents, including executing AI agents in an isolated browser with [Browser Isolation](/cloudflare-one/policies/browser-isolation/), enforcing [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) profiles to prevent your users from sharing sensitive data, and scanning content to avoid answers from AI agents that violate internal corporate guidelines. Creating an AI agent wrapper is also an effective way to enforce tenant control if you have an enterprise plan for a specific AI provider, such as ChatGPT Enterprise.
1111

1212
This tutorial uses ChatGPT as an example AI agent.
1313

1414
## Before you begin
1515

1616
Make sure you have:
1717

18+
- A [Cloudflare Zero Trust organization](/cloudflare-one/setup/).
1819
- An API key for your desired AI provider, such as an [OpenAI API key](https://platform.openai.com/api-keys) for ChatGPT.
1920

2021
## 1. Create an AI gateway
2122

22-
First, create an AI gateway to control an AI app.
23+
First, create an AI gateway to control your AI app.
2324

24-
1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
25+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
2526
2. Go to **AI** > **AI Gateway**.
2627
3. Select **Create Gateway**.
2728
4. Name your gateway.
@@ -430,7 +431,7 @@ Now that you have full control over access to your AI agent wrapper, you can enf
430431

431432
### Apply Data Loss Prevention profiles
432433

433-
You can use [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) to prevent your users from sending sensitive data to the AI agent.
434+
You can use [Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to prevent your users from sending sensitive data to the AI agent.
434435

435436
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
436437
2. Ensure that the [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) you want to enforce are properly configured.
@@ -443,6 +444,8 @@ You can use [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention
443444

444445
4. Select **Create policy**.
445446

447+
For more information on creating DLP policies, refer to [Scan HTTP traffic](/cloudflare-one/policies/data-loss-prevention/dlp-policies/).
448+
446449
### Execute in a clientless isolated browser
447450

448451
Because you published your wrapper as a self-hosted Access application, you can execute it in an [isolated session](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) for your users by creating an [Access policy](/cloudflare-one/policies/access/) and configuring it for your application.

0 commit comments

Comments
 (0)