Skip to content

Commit 203a984

Browse files
authored
[ZT] Infra Access changelog (#19702)
* PCX-15707 * update SSH introduction * apply review feedback
1 parent 5dfb2de commit 203a984

File tree

2 files changed

+10
-1
lines changed

2 files changed

+10
-1
lines changed

src/content/changelogs/access.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,18 @@ entries:
99
title: Access Applications support private hostnames/IPs and reusable Access policies.
1010
description: |-
1111
Cloudflare Access self-hosted applications can now be defined by [private IPs](/cloudflare-one/applications/non-http/self-hosted-private-app/), [private hostnames](/cloudflare-one/applications/non-http/self-hosted-private-app/) (on port 443) and [public hostnames](/cloudflare-one/applications/configure-apps/self-hosted-public-app/). Additionally, we made Access policies into their own object which can be reused across multiple applications. These updates involved significant updates to the overall Access dashboard experience. The updates will be slowly rolled out to different customer cohorts. If you are an Enterprise customer and would like early access, reach out to your account team.
12+
- publish_date: "2025-01-15"
13+
title: Logpush for SSH command logs
14+
description: |-
15+
Enterprise customers can now use Logpush to export SSH command logs for Access for Infrastructure targets.
1216
- publish_date: "2024-12-04"
1317
title: SCIM GA for Okta and Microsoft Entra ID
1418
description: |-
1519
Cloudflare's SCIM integrations with [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) and [Microsoft Entra ID](//cloudflare-one/identity/idp-integration/entra-id/#synchronize-users-and-groups) (formerly AzureAD) are now out of beta and generally available (GA) for all customers. These integrations can be used for Access and Gateway policies and Zero Trust user management. Note: This GA release does not include [Dashboard SSO SCIM](/fundamentals/setup/account/account-security/scim-setup/) support.
20+
- publish_date: "2024-10-23"
21+
title: SSH with Access for Infrastructure
22+
description: |-
23+
Admins can now use [Access for Infrastructure](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to manage privileged access to SSH servers. Access for Infrastructure provides improved control and visibility over who accessed what service and what they did during their SSH session. Access for Infrastructure also eliminates the risk and overhead associated with managing SSH keys by using short-lived SSH certificates to access SSH servers.
1624
- publish_date: "2024-08-26"
1725
title: Reduce automatic seat deprovisioning minimum to 1 month, down from 2 months.
1826
description: |-

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ sidebar:
1111

1212
import { Tabs, TabItem, Badge, Render } from "~/components";
1313

14-
[Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) uses the same deployment model as [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/) but unlocks more granular policy options and command logging functionality.
14+
[Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) provides granular control over how users can connect to your SSH servers. This feature uses the same deployment model as [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/) but unlocks more policy options and command logging functionality.
15+
1516
<Render file="access/short-lived-certs-intro" params={{ intro: "Furthermore, Access for Infrastructure replaces" }} />
1617

1718
## 1. Connect the server to Cloudflare

0 commit comments

Comments
 (0)