Skip to content

Commit 2ad5698

Browse files
Apply suggestions from code review
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent c4c4d4f commit 2ad5698

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

src/content/docs/reference-architecture/diagrams/sase/augment-access-with-serverless.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This document outlines how to combine both solutions to enhance Cloudflare Acces
3939
## Use-cases
4040

4141
- **Custom authorization logic**: Access External evaluation using Workers as a backend (for example, using your own implementation of [Open Policy Agent aka OPA](https://www.openpolicyagent.org/integrations/cloudflare-worker/)])
42-
- **Augmented [JSON Web Token (JWT)](https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/validating-json/)**: Using Cloudflares own authentication JWT material, for example, adding posture details as part of an incoming request.
42+
- **Augmented [JSON Web Token (JWT)](https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/validating-json/)**: Using Cloudflare's own authentication JWT material, for example, adding posture details as part of an incoming request.
4343
- **Serverless augmented apps protected with Zero-trust**: Allowing anyone building serverless applications to benefit from native ZTNA features
4444

4545

@@ -52,9 +52,9 @@ The following outlines how organizations can run their own custom business logic
5252

5353
### 1. Custom authorization process using your own rules
5454

55-
During policy evaluation, the [external evaluation](https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/) rule allows for executing your own code during access policy evaluation. In this example an API exposed by Cloudflare Workers receives data about the user making the request, the important part being their username.
55+
During policy evaluation, the [external evaluation](/cloudflare-one/policies/access/external-evaluation/) rule allows for executing your own code during access policy evaluation. In this example an API exposed by Cloudflare Workers receives data about the user making the request, the important part being their username.
5656

57-
The code typically makes calls to either a [database](https://developers.cloudflare.com/d1/) or another API to evaluate if the passed username has access to the application. The external evaluation rule requires that the call returns either a True or False, and this is combined with the policy to determine access.
57+
The code typically makes calls to either a [database](/d1/) or another API to evaluate if the passed username has access to the application. The external evaluation rule requires that the call returns either a True or False, and this is combined with the policy to determine access.
5858

5959
<LinkCard
6060
title="Learn more"
@@ -66,7 +66,7 @@ The code typically makes calls to either a [database](https://developers.cloudf
6666

6767
When a user successfully authenticates and is authorized to access a protected application, Cloudflare inserts a [JSON Web Token (JWT)](https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/validating-json/) into the HTTP traffic sent to the origin. This token serves as a valuable asset for expanding custom business logic through secure processing. The format for that JWT is deterministic and rather lightweight to avoid overloading the requests towards origin unnecessarily.
6868

69-
Here is an example of a JWT send to an origin (use [jwt.io](http://jwt.io) to read the contents of a JWT)
69+
Here is an example of a JWT sent to an origin (use [JWT.io](http://jwt.io) to read the contents of a JWT)
7070

7171

7272
```json title="JWT content"
@@ -87,9 +87,9 @@ Here is an example of a JWT send to an origin (use [jwt.io](http://jwt.io) to re
8787
}
8888
```
8989

90-
Cloudflare exposes a specific [endpoint](https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/validating-json/#_top) to allow anyone to validate and expand a Cloudflare signed JWT.
90+
Cloudflare exposes a specific [endpoint](/cloudflare-one/identity/authorization-cookie/validating-json/#_top) to allow anyone to validate and expand a Cloudflare signed JWT.
9191

92-
Cloudflares Workers are a great candidate for interacting with incoming JSON Web Tokens (JWTs), enabling additional processing directly within the serverless platform without introducing any added latency.
92+
Cloudflare's Workers are a great candidate for interacting with incoming JSON Web Tokens (JWTs), enabling additional processing directly within the serverless platform without introducing any added latency.
9393

9494

9595
<LinkCard
@@ -100,7 +100,7 @@ Cloudflare’s Workers are a great candidate for interacting with incoming JSON
100100

101101
### 3. Augment the authentication material (JWT) with extra authentication details
102102

103-
In some situations, it is beneficial to elaborate on this JWT in order to execute additional processing on the protected destination application (for example, adding device [posture details](https://developers.cloudflare.com/cloudflare-one/identity/devices/) as part of an incoming request).
103+
In some situations, it is beneficial to elaborate on this JWT in order to execute additional processing on the protected destination application (for example, adding device [posture details](/cloudflare-one/identity/devices/) as part of an incoming request).
104104

105105
In the following example, we want to make sure the exposed application is aware of the status of the device's firewall and disk encryption (Note that the WARP client needs to be installed on the client machine for these signals to be collected).
106106

@@ -184,7 +184,7 @@ Using the details in the JWT, you can use a Worker to extract the details of the
184184

185185
## Related Resources
186186

187-
- [External Evaluation rules](https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/)
188-
- [SASE reference architecture](https://developers.cloudflare.com/reference-architecture/architectures/sase/)
189-
- [External Evaluation rules Developer Documentation](https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/)
187+
- [External Evaluation rules](/cloudflare-one/policies/access/external-evaluation/)
188+
- [SASE reference architecture](/reference-architecture/architectures/sase/)
189+
- [External Evaluation rules Developer Documentation](/cloudflare-one/policies/access/external-evaluation/)
190190
- [External Evaluation blog post](https://blog.cloudflare.com/access-external-validation-rules/)

0 commit comments

Comments
 (0)