Skip to content

Commit 31b6e15

Browse files
committed
initial commit
1 parent 603e5ff commit 31b6e15

File tree

4 files changed

+26
-5
lines changed

4 files changed

+26
-5
lines changed

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ Certain protocols require configuring the server to trust connections through Ac
5656

5757
Users connect to the target's IP address as if they were on your private network, using their preferred client software. The user must be logged into WARP on their device, but no other system configuration is required. You can optionally configure a [private DNS resolver](/cloudflare-one/policies/gateway/resolver-policies/) to allow connections to the target's private hostname.
5858

59+
SSH with Access for Infrastructure also supports `scp` and `rsync` functions. At this time, `sftp` is not supported.
60+
5961
### Connect to different VNET
6062

6163
To connect to targets that are in different VNETS, users will need to [switch their connected virtual network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/#connect-to-a-virtual-network) in the WARP client.

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,9 @@ import { Tabs, TabItem, Badge, Render } from "~/components";
2525
To connect your devices to Cloudflare:
2626

2727
1. [Deploy the WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/) on your devices in Gateway with WARP mode.
28-
2. Install and trust the [Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your devices.
29-
3. [Create device enrollment rules](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/) to determine which devices can enroll to your Zero Trust organization.
28+
2. [Enable proxy mode for WARP](/cloudflare-one/connections/connect-networks/warp/warp-modes/#proxy-mode).
29+
3. Install and trust the [Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your devices.
30+
4. [Create device enrollment rules](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/) to determine which devices can enroll to your Zero Trust organization.
3031

3132
## 3. Route private network IPs through WARP
3233

src/content/partials/cloudflare-one/access/add-target.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ To create a new target:
1111

1212
<Tabs>
1313
<TabItem label="Dashboard">
14-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Network** > **Targets**.
14+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Networks** > **Targets**.
1515
2. Select **Add a target**.
1616
3. In **Target hostname**, enter a user-friendly name for the target resource. We recommend using the server hostname, for example `production-server`. The hostname does not need to be unique and can be reused for multiple targets. Hostnames are used to define the subset of targets included in an infrastructure application and are not used in DNS address resolution.
1717
<Details header="Format restrictions">

src/content/partials/cloudflare-one/ssh/ssh-proxy-ca.mdx

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
import { Render } from "~/components"
77

8-
1. Make a `POST` request to the Cloudflare API with your email address and [API key](/fundamentals/api/get-started/keys/) as request headers.
8+
1. If you have not yet generated your Cloudflare SSH CA, make a `POST` request to the Cloudflare API with your email address and [API key](/fundamentals/api/get-started/keys/) as request headers.
99

1010
```bash
1111
curl --request POST \
@@ -14,4 +14,22 @@ import { Render } from "~/components"
1414
--header "X-Auth-Key: <API_KEY>"
1515
```
1616

17-
2. Copy the `public_key` value returned in the response.
17+
2. If you have already created your Cloudflare SSH CA or try the above and receive the error message, "access.api.error.gateway_ca_already_exists," modify the above command to a `GET` request instead.
18+
19+
```bash
20+
curl --request GET \
21+
"https://api.cloudflare.com/client/v4/accounts/{account_id}/access/gateway_ca" \
22+
--header "X-Auth-Email: <EMAIL>" \
23+
--header "X-Auth-Key: <API_KEY>"
24+
```
25+
26+
3. If you would like to use an API token instead of a Global API key, the token must have edit permissions for "Access: SSH Auditing" permissions. The `POST` or `GET` request should be modified to use the "Authorization: Bearer" value instead of "X-Auth-Key."
27+
28+
```bash
29+
curl --request POST \
30+
"https://api.cloudflare.com/client/v4/accounts/{account_id}/access/gateway_ca" \
31+
--header "X-Auth-Email: <EMAIL>" \
32+
--header "Authorization: Bearer <API_TOKEN>"
33+
```
34+
35+
4. Copy the `public_key` value returned in the response.

0 commit comments

Comments
 (0)