Skip to content

Commit 41a4c37

Browse files
committed
update IA
1 parent 4600d62 commit 41a4c37

File tree

10 files changed

+73
-69
lines changed

10 files changed

+73
-69
lines changed
-77.3 KB
Binary file not shown.

src/content/docs/cloudflare-one/applications/configure-apps/dash-sso-apps.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: how-to
33
title: Cloudflare dashboard SSO application
44
sidebar:
5-
order: 3
5+
order: 4
66

77
---
88

@@ -40,7 +40,7 @@ Once your SSO domain is approved, a new **SSO App** application will appear unde
4040

4141
:::note
4242

43-
We recommend noting down your [Global API key](/fundamentals/api/get-started/keys/) in case you need to [disable SSO](#option-2-disable-dashboard-sso) later.
43+
We recommend noting down your [Global API key](/fundamentals/api/get-started/keys/) in case you need to [disable SSO](#option-2-disable-dashboard-sso) later.
4444
:::
4545

4646
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.

src/content/docs/cloudflare-one/applications/configure-apps/index.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,16 @@ sidebar:
66

77
---
88

9-
Cloudflare Access allows you to secure your web applications by acting as an identity aggregator, or proxy. Users can only log in to the application if they meet the criteria you want to introduce.
9+
Cloudflare Access allows you to secure your web applications by acting as an identity aggregator, or proxy. You can use signals from your existing identity providers (IdPs), device posture providers, and [other rules](/cloudflare-one/policies/access/#selectors) to control who can log in to the application.
1010

1111
![Cloudflare Access verifies a user's identity before granting access to your application.](~/assets/images/cloudflare-one/applications/diagram-saas.jpg)
1212

1313
You can protect the following types of web applications:
1414

15-
- [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday.
15+
- [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday. To secure SaaS applications, you must integrate Cloudflare Access with the SaaS application's SSO configuration.
1616

17-
- [**Self-hosted applications**](/cloudflare-one/applications/configure-apps/self-hosted-apps/) consist of internal applications that you host in your own environment. These can be hosted versions of tools like the Atlassian suite or applications created and hosted by your own team.
17+
- **Self-hosted applications** consist of internal applications that you host in your own environment. These can be the data center versions of tools like the Atlassian suite or applications created by your own team. Setup requirements for a self-hosted application depend on whether the application is publicly accessible on the Internet or restricted to users on a private network.
18+
- [**Public hostname applications**](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) are web applications that have public DNS records. Anyone on the Internet can access the application by entering the URL in their browser and authenticating through Cloudflare Access. Securing access to a public website requires a Cloudflare DNS [full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/).
19+
- [**Private network applications**](/cloudflare-one/applications/non-http/self-hosted-private-app/) do not have public DNS records, meaning they are not reachable from the public Internet. To connect using a private IP or private hostname, remote users must install the WARP client on their device and enroll in your Zero Trust organization.
1820

19-
- [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) is a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits.
21+
- [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) is a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits.

src/content/docs/cloudflare-one/applications/configure-apps/self-hosted-apps/index.mdx

Lines changed: 0 additions & 19 deletions
This file was deleted.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
pcx_content_type: how-to
33
title: Publish a self-hosted application to the Internet
44
sidebar:
5-
order: 1
6-
label: Public hostname applications
5+
order: 2
6+
label: Self-hosted public application
77
---
88

99
import { Render } from "~/components"
1010

11-
11+
You can securely publish internal tools and applications by adding Cloudflare Access as an authentication layer between the end user and your origin server.
1212

1313
## Prerequisites
1414

src/content/docs/cloudflare-one/applications/non-http/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ Non-HTTP applications require [connecting your private network](/cloudflare-one/
1414

1515
## WARP client
1616

17-
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access the application unless you build policies to allow or block specific users.
17+
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access the application. To secure the application, you can [create a self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/policies/access/) that allow or block specific users.
1818

19-
If you would like to define how users access specific infrastructure servers within your network, create an infrastructure application in [Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/). Access for Infrastructure provides an additional layer of control and visibility over how users access non-HTTP applications, including:
19+
If you would like to define how users access specific infrastructure servers within your network, [create an infrastructure application](/cloudflare-one/applications/non-http/infrastructure-apps/) in Access for Infrastructure. Access for Infrastructure provides an additional layer of control and visibility over how users access non-HTTP applications, including:
2020
- Define fine-grained policies to govern who has access to specific servers and exactly how a user may access that server.
2121
- Eliminate SSH keys by using short-lived certificates to authenticate users.
2222

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Private network applications (legacy)
4+
sidebar:
5+
order: 4
6+
label: Private network applications (legacy)
7+
---
8+
9+
:::note
10+
Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to secure a private IP address.
11+
:::
12+
13+
You can configure a **Private Network** application to manage access to specific applications on your private network.
14+
15+
To create a private network application:
16+
17+
1. In Zero Trust, go to **Access** > **Applications** > **Add an application**.
18+
19+
2. Select **Private Network**.
20+
21+
3. Name your application.
22+
23+
4. For **Application type**, select _Destination IP_.
24+
25+
5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
26+
:::note
27+
If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
28+
:::
29+
30+
6. Configure your [App Launcher](/cloudflare-one/applications/app-launcher/) visibility and logo.
31+
32+
7. Select **Next**. You will see two auto-generated Gateway Network policies: one that allows access to the destination IP and another that blocks access.
33+
34+
8. Modify the policies to include additional identity-based conditions. For example:
35+
36+
- **Policy 1**
37+
38+
| Selector | Operator | Value | Logic | Action |
39+
| -------------- | ------------- | ---------------- | ----- | ------ |
40+
| Destination IP | in | `10.128.0.7` | And | Allow |
41+
| User Email | matches regex | `.*@example.com` | | |
42+
43+
- **Policy 2**
44+
45+
| Selector | Operator | Value | Action |
46+
| -------------- | -------- | ------------ | ------ |
47+
| Destination IP | in | `10.128.0.7` | Block |
48+
49+
Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).
50+
51+
9. Select **Add application**.
52+
53+
Your application will appear on the **Applications** page.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Secure a private IP or hostname
4+
sidebar:
5+
order: 3
6+
label: Add a self-hosted private application
7+
---

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx

Lines changed: 0 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -40,45 +40,6 @@ By default, all WARP devices enrolled in your Zero Trust organization can connec
4040

4141
### Create Zero Trust policies
4242

43-
You can create Zero Trust policies to manage access to specific applications on your network.
44-
45-
1. Go to **Access** > **Applications** > **Add an application**.
46-
47-
2. Select **Private Network**.
48-
49-
3. Name your application.
50-
51-
4. For **Application type**, select _Destination IP_.
52-
53-
5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
54-
:::note
55-
If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
56-
:::
57-
58-
6. Configure your [App Launcher](/cloudflare-one/applications/app-launcher/) visibility and logo.
59-
60-
7. Select **Next**. You will see two auto-generated Gateway Network policies: one that allows access to the destination IP and another that blocks access.
61-
62-
8. Modify the policies to include additional identity-based conditions. For example:
63-
64-
- **Policy 1**
65-
66-
| Selector | Operator | Value | Logic | Action |
67-
| -------------- | ------------- | ---------------- | ----- | ------ |
68-
| Destination IP | in | `10.128.0.7` | And | Allow |
69-
| User Email | matches regex | `.*@example.com` | | |
70-
71-
- **Policy 2**
72-
73-
| Selector | Operator | Value | Action |
74-
| -------------- | -------- | ------------ | ------ |
75-
| Destination IP | in | `10.128.0.7` | Block |
76-
77-
Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).
78-
79-
9. Select **Add application**.
80-
81-
Your application will appear on the **Applications** page.
8243

8344
## 5. Connect as a user
8445

File renamed without changes.

0 commit comments

Comments
 (0)