You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/gateway/managed-service-providers.mdx
+36-10Lines changed: 36 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,32 +9,58 @@ sidebar:
9
9
Only available on Enterprise plans. For more information, contact your account team.
10
10
:::
11
11
12
-
Gateway supports the [Cloudflare Tenant API](/tenant/), which allows Cloudflare-partnered managed service providers (MSPs) to set up and manage Cloudflare accounts and services for their customers. With Tenant, MSPs can create Zero Trust deployments with global Gateway policy control. Policies can be customized or overridden at a organization group or account level.
12
+
Gateway supports the [Cloudflare Tenant API](/tenant/), which allows Cloudflare-partnered managed service providers (MSPs) to set up and manage Cloudflare accounts and services for their customers. With the Tenant API, MSPs can create Zero Trust deployments with global Gateway policy control. Policies can be customized or overridden at a group or account level.
13
13
14
-
The Tenant platform only supports Gateway DNS policies.
14
+
The Tenant platform only supports [DNS policies](/cloudflare-one/policies/gateway/dns-policies/). For more information, refer to the [Cloudflare Zero Trust for managed service providers](https://blog.cloudflare.com/gateway-managed-service-provider/) blog post.
15
15
16
16
## Get started
17
17
18
18
{/* Don't need to surface much of the policy creation flow here */}
19
19
20
-
To set up the Tenant API, refer to [Get started](/tenant/get-started/).
21
-
22
-
Once you have provisioned your customer's Cloudflare accounts, you can create [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
20
+
To set up the Tenant API, refer to [Get started](/tenant/get-started/). Once you have provisioned and configured your customer's Cloudflare accounts, you can create [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
23
21
24
22
## Account types
25
23
26
-
The Gateway Tenant platform supports tiered and siloed accounts.
24
+
The Gateway Tenant platform supports tiered and siloed account configurations.
27
25
28
26
### Tiered accounts
29
27
30
-
{/* TODO: convert first diagram from blog post to mermaid flowchart */}
31
-
32
28
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can override or add policies as needed while still managed by the parent account.
33
29
34
-
Gateway evaluates parent account policies before a child account policies. To allow a child account to override a parent account's policy, you can use the [Update a Zero Trust Gateway rule](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/update/) endpoint to set the policy's `allow_child_bypass` rule setting to `true`.
30
+
Gateway evaluates parent account policies before any child account policies. To allow a child account to override a specific parent account policy, you can use the [Update a Zero Trust Gateway rule](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/update/) endpoint to set the policy's `allow_child_bypass` rule setting to `true`.
31
+
32
+
```mermaid
33
+
flowchart TD
34
+
%% Accessibility
35
+
accTitle: How Gateway policies work in a tiered account configuration
36
+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration.
37
+
38
+
%% Flowchart
39
+
subgraph s1["Parent account"]
40
+
n1["Block malware"]
41
+
n2["Block DNS tunnel"]
42
+
n3["Block spyware"]
43
+
end
44
+
subgraph s2["Child account A"]
45
+
n4["Block social media"]
46
+
end
47
+
subgraph s3["Child account B"]
48
+
n5["Block instant messaging"]
49
+
end
50
+
n1 ~~~ n2
51
+
n2 ~~~ n3
52
+
A["Tenant"] --Administers--> s1
53
+
s1 --> s2 & s3
54
+
55
+
n1@{ shape: lean-l}
56
+
n2@{ shape: lean-l}
57
+
n3@{ shape: lean-l}
58
+
n4@{ shape: lean-l}
59
+
n5@{ shape: lean-l}
60
+
```
35
61
36
62
### Siloed accounts
37
63
38
64
{/* TODO: convert second diagram from blog post to mermaid flowchart */}
39
65
40
-
Each account operates independently within the same tenant. Each account manages its own security policies, resources, and configurations separately.
66
+
In a siloed account configuration, each account operates independently within the same tenant. Each account manages its own security policies, resources, and configurations separately.
0 commit comments