Skip to content

Commit 3b94369

Browse files
committed
private app updates
1 parent 4ce53f4 commit 3b94369

File tree

4 files changed

+88
-4
lines changed

4 files changed

+88
-4
lines changed

src/content/docs/cloudflare-one/applications/non-http/private-network-app.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ sidebar:
77
---
88

99
:::note
10-
Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to secure a private IP address.
10+
Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) to secure a private IP address.
1111
:::
1212

1313
You can configure a **Private Network** application to manage access to specific applications on your private network.
1414

1515
To create a private network application:
1616

17-
1. In Zero Trust, go to **Access** > **Applications** > **Add an application**.
17+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications** > **Add an application**.
1818

1919
2. Select **Private Network**.
2020

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,77 @@ sidebar:
55
order: 3
66
label: Add a self-hosted private application
77
---
8+
9+
import { Render } from "~/components"
10+
11+
You can configure a self-hosted Access application to manage access to specific IPs or hostnames on your private network.
12+
13+
## Prerequisites
14+
15+
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
16+
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
17+
- [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser. Otherwise, users will receive a pop-up notification from the WARP client.
18+
19+
## 1. Add your application to Access
20+
21+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
22+
23+
2. Select **Add an application**.
24+
25+
3. Select **Self-hosted**.
26+
27+
4. Enter any name for the application.
28+
29+
5. In **Session Duration**, choose how often the user's [application token](/cloudflare-one/identity/authorization-cookie/application-token/) should expire.
30+
31+
Cloudflare checks every HTTP request to your application for a valid application token. If the user's application token (and global token) has expired, they will be prompted to reauthenticate with the IdP. For more information, refer to [Session management](/cloudflare-one/identity/users/session-management/).
32+
33+
6. Add the private IP and/or private hostname that represents the application.
34+
35+
:::note
36+
Private hostnames are currently only available over port `443` over HTTPS.
37+
:::
38+
39+
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application.
40+
41+
8. <Render file="access/access-choose-idps" product="cloudflare-one" />
42+
43+
9. Select **Next**.
44+
45+
10. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.
46+
47+
11. <Render file="access/access-block-page" product="cloudflare-one" />
48+
49+
12. Select **Next**.
50+
51+
13. (Optional) Configure advanced settings for your application:
52+
53+
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
54+
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
55+
- **Browser rendering settings**:
56+
- [Automatic `cloudflared` authentication](/cloudflare-one/applications/non-http/cloudflared-authentication/automatic-cloudflared-authentication/)
57+
- [Browser rendering for SSH and VNC](/cloudflare-one/applications/non-http/browser-rendering/)
58+
- **401 Response for Service Auth policies**: Return a `401` response code when a user (or machine) makes a request to the application without the correct [service token](/cloudflare-one/identity/service-tokens/).
59+
60+
14. Select **Save**.
61+
62+
## 2. (Optional) Modify order of precedence in Gateway
63+
64+
By default, Cloudflare will evaluate Access private application policies after evaluating all Gateway network policies. To evaluate Access private application policies before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
65+
66+
67+
| Selector | Operator | Value | Action |
68+
| -------- | -------- | ------------ | ------ |
69+
| All Access Private Apps | is | `Enabled` | Allow |
70+
71+
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
72+
73+
:::note
74+
All Access applications are deny by default -- a user must match an associated Access Allow policy before they are granted access. The Gateway policy is strictly for routing and connectivity purposes.
75+
:::
76+
77+
## 3. Validate the Access token
78+
79+
<Render file="access/secure-tunnel-with-access" />
80+
81+
Users can now connect to your private application after authenticating with Cloudflare Access.

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,15 @@ To connect your infrastructure with Cloudflare Tunnel:
3232

3333
## 4. (Recommended) Filter network traffic with Gateway
3434

35-
By default, all WARP devices enrolled in your Zero Trust organization can connect to your private network through Cloudflare Tunnel. You can configure Gateway to inspect your network traffic and either block or allow access based on user identity and device posture.
35+
By default, all WARP devices enrolled in your Zero Trust organization can connect to your private network through Cloudflare Tunnel. You can configure Gateway inspect your network traffic and either block or allow access based on user identity and device posture.
3636

3737
### Enable the Gateway proxy
3838

3939
<Render file="tunnel/enable-gateway-proxy" />
4040

41-
### Create Zero Trust policies
41+
### Zero Trust policies
4242

43+
Cloudflare Zero Trust allows you to configure security policies using either Access or Gateway. If you have applications clearly defined by IPs or hostnames, we recommend [creating an Access application](/cloudflare-one/applications/non-http/self-hosted-private-app/) and managing user access alongside your SaaS and other web apps. Alternatively, if you prefer to secure a private network using a traditional firewall model, you can build Gateway [network and DNS policies](/learning-paths/replace-vpn/build-policies/) for IP ranges and domains.
4344

4445
## 5. Connect as a user
4546

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ API value: `allow`
3838

3939
**Traffic**
4040

41+
- [All Access Private Apps](#all-access-private-apps)
4142
- [Application](#application)
4243
- [Content Categories](#content-categories)
4344
- [Destination Continent IP Geolocation](#destination-continent)
@@ -228,6 +229,14 @@ Gateway will only log successful override connections in your [network logs](/cl
228229

229230
Gateway matches network traffic against the following selectors, or criteria.
230231

232+
### All Access Private Apps
233+
234+
All destination IPs and hostnames associated with an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/#2-optional-modify-order-of-precedence-in-gateway).
235+
236+
| UI name | API example |
237+
| ----------- | -------------------------- |
238+
| All Access Private Apps | `access.private_app` |
239+
231240
### Application
232241

233242
<Render file="gateway/selectors/application" params={{ one: "network" }} />

0 commit comments

Comments
 (0)