Skip to content

Commit 464bbb9

Browse files
ranbelmaxvp
authored andcommitted
[ZT] WARP notifications (#20685)
* create partial * Fix runtime error * private app notifications * update descriptions --------- Co-authored-by: Max Phillips <[email protected]>
1 parent e8aad60 commit 464bbb9

File tree

6 files changed

+26
-7
lines changed

6 files changed

+26
-7
lines changed

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
1818

1919
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
2020
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
21-
- [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser and issue an authorization JWT to your origin. Otherwise, users will receive a pop-up notification from the WARP client and all session management will be handled in the WARP client.
21+
- (Optional) Turn on [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) if you want to use Access JWTs to manage [HTTPS application sessions](#https-applications).
2222

2323
## Add your application to Access
2424

@@ -58,7 +58,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
5858

5959
12. Select **Next**.
6060

61-
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require Gateway TLS decryption.
61+
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
6262

6363
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
6464
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
@@ -71,6 +71,20 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
7171

7272
Users can now connect to your private application after authenticating with Cloudflare Access.
7373

74+
## Authentication flow
75+
76+
### HTTPS applications
77+
78+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned on and a user is accessing an HTTPS application on port `443`, Cloudflare Access will present a login page in the browser and issue an [application token](/cloudflare-one/identity/authorization-cookie/application-token/) to your origin. This is the same cookie-based authentication flow used by [self-hosted public apps](/cloudflare-one/applications/configure-apps/self-hosted-public-app/).
79+
80+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned off, session management is [handled in the WARP client](#non-https-applications) instead of in the browser.
81+
82+
### Non-HTTPS applications
83+
84+
The WARP client manages sessions for all non-HTTPS applications. Users will receive an `Authentication required` pop-up notification from the WARP client. When the user selects the notification, WARP will open a browser window with your Access login page.
85+
86+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
87+
7488
## Modify order of precedence in Gateway
7589

7690
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):

src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ When choosing the Block action, turn on **Display custom block page** to respond
142142

143143
#### WARP client block notifications
144144

145-
<Render file="gateway/client-notifications" />
145+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
146146

147147
### Override
148148

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ The Block action blocks outbound traffic from reaching destinations you specify
155155

156156
#### WARP client block notifications
157157

158-
<Render file="gateway/client-notifications" />
158+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
159159

160160
### Isolate
161161

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Policies with Block actions block network traffic from reaching certain IPs or p
179179

180180
#### WARP client block notifications
181181

182-
<Render file="gateway/client-notifications" />
182+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
183183

184184
### Network Override
185185

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
---
2+
{}
3+
---
4+
5+
Ensure that your operating system allows notifications for WARP. Your device may not display notifications if focus, do not disturb, or screen sharing settings are turned on. To turn on client notifications on macOS devices running DisplayLink software, you may have to allow system notifications when mirroring your display. For more information, refer to the [macOS documentation](https://support.apple.com/guide/mac-help/change-notifications-settings-mh40583/mac).

src/content/partials/cloudflare-one/gateway/client-notifications.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{}
33
---
44

5-
import { Details } from "~/components";
5+
import { Details, Render } from "~/components";
66

77
<Details header="Feature availability">
88

@@ -25,4 +25,4 @@ Turn on **Display block notification for WARP client** to display notifications
2525

2626
Upon selecting the notification, WARP will direct your users to a block page. Optionally, you can direct users to a custom URL, such as an internal support form.
2727

28-
Your device may not display block notifications if focus, do not disturb, or screen sharing settings are turned on. To turn on client notifications on macOS devices running DisplayLink software, you may have to allow system notifications when mirroring your display. For more information, refer to the [macOS documentation](https://support.apple.com/guide/mac-help/change-notifications-settings-mh40583/mac).
28+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />

0 commit comments

Comments
 (0)