Skip to content

Commit 44e9825

Browse files
kennyj42ranbel
andauthored
Changelog for Access Supports all ports and protocols on private hostname apps (#26103)
* Add changelog for Access support of all ports and protocols Access private hostname applications can now utilize any port and protocol, enhancing security controls. * Add files via upload * Updated based on gemini prompt recommendations * Update 2025-10-28-Access-Application-Support-For-All-Ports-And-Protocols.mdx --------- Co-authored-by: ranbel <[email protected]>
1 parent a14a88f commit 44e9825

File tree

2 files changed

+19
-0
lines changed

2 files changed

+19
-0
lines changed
41 KB
Loading
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Access private hostname applications support all ports/protocols
3+
description: Cloudflare Access for private hostname applications can now secure traffic on all ports and protocols. 🔒
4+
date: 2025-10-28
5+
products:
6+
- access
7+
---
8+
9+
[Cloudflare Access for private hostname applications](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) can now secure traffic on all ports and protocols.
10+
11+
Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port `443` and support Server Name Indicator (SNI).
12+
13+
This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controls — like single sign-on (SSO), MFA, device posture, and variable session lengths — to any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTPS applications.
14+
15+
![Example private application on non-443 port](~/assets/images/changelog/access/internal_private_app_any_port.png)
16+
17+
For example, you can now create a self-hosted application in Access for `ssh.testapp.local` running on port `22`. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.
18+
19+
This feature is generally available across all plans.

0 commit comments

Comments
 (0)