Skip to content

Commit 490b649

Browse files
[CF1] 405 erorr update (#22492)
1 parent a8942f0 commit 490b649

File tree

1 file changed

+3
-50
lines changed

1 file changed

+3
-50
lines changed

src/content/docs/cloudflare-one/policies/browser-isolation/known-limitations.mdx

Lines changed: 3 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -67,58 +67,11 @@ When a user downloads a file within the remote browser, the file is held in memo
6767

6868
## SAML applications
6969

70-
When Browser Isolation is [deployed in-line](/cloudflare-one/policies/browser-isolation/setup/) (for example, via WARP, Gateway proxy endpoint or Magic WAN) it is possible to configure a subset of traffic to be isolated. Browser Isolation segregates local and remote browsing contexts. Due to this, cross-domain interactions (such as single sign-on) may not function as expected.
70+
Cloudflare Remote Browser Isolation now [supports SAML applications that use HTTP-POST bindings](/cloudflare-one/changelog/browser-isolation/#2025-05-13). This resolves previous issues such as `405` errors and login loops during SSO authentication flows.
7171

72-
### `POST` request returns `405` error
72+
You no longer need to isolate both the Identity Provider (IdP) and Service Provider (SP), or switch to HTTP-Redirect bindings, to use Browser Isolation with POST-based SSO. Users can log in to internal or SaaS applications in the isolated browser securely and seamlessly.
7373

74-
This error typically occurs due to SAML HTTP-POST bindings. These are not yet supported between non-isolated Identity Providers (IdP) and isolated Service Providers (SP).
75-
76-
### Workarounds
77-
78-
The following workarounds enable isolating SAML applications with Browser Isolation.
79-
80-
#### Use SAML HTTP-Redirect bindings
81-
82-
Configure your SAML implementation to use HTTP Redirect Bindings. This avoids the HTTP `405` error by using URL parameters to route SAMLResponse data into the isolated SP.
83-
84-
#### Clientless Web Isolation
85-
86-
Direct your users to use access the application via [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/). Clientless Web Isolation implicitly isolates all traffic (both IdP and SP) and supports HTTP-POST SAML bindings.
87-
88-
For user convenience, [create a bookmark](/cloudflare-one/applications/bookmarks/) in Cloudflare Access for your application (for example, `https://<authdomain>.cloudflareaccess.com/browser/https://example.com`).
89-
90-
:::note
91-
IdP sessions are not shared between the non-isolated IdP and the Clientless Web Isolation IdP. Users will be prompted to establish an additional session with their IdP.
92-
:::
93-
94-
#### Add the application to Access
95-
96-
Configure a [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) in Cloudflare Access and [enable browser isolation](/cloudflare-one/policies/access/isolate-application/) in the application settings.
97-
98-
#### Isolate both identity provider and service provider
99-
100-
The HTTP `405` error does not occur when both the IdP and SP are isolated. For example:
101-
102-
| Precedence | Selector | Operator | Value | Action |
103-
| ---------- | ----------- | -------- | ----------------- | ------- |
104-
| 1 | Application | in | _Okta_, _Zendesk_ | Isolate |
105-
106-
:::note
107-
SAML HTTP-POST attempts initiated from the remote browser are not forwarded to non-Isolated SPs. All SPs should be isolated to avoid SSO errors.
108-
:::
109-
110-
#### In-line SSO between Okta and Salesforce
111-
112-
Some applications that use HTTP-POST bindings (such as Salesforce) complete SSO with an internal HTTP redirect. Applying a Do Not Isolate policy to the SAML HTTP-POST endpoint enables the SAML flow to complete, and authenticate the user into the application in the remote browser. For example:
113-
114-
| Precedence | Selector | Operator | Value | Logic | Action |
115-
| ---------- | ----------- | -------- | ------------------------------------ | ----- | -------------- |
116-
| 1 | Host | in | `your-salesforce-domain.example.com` | And | Do Not Isolate |
117-
| | HTTP Method | in | _POST_ | | |
118-
119-
| Precedence | Selector | Operator | Value | Action |
120-
| ---------- | -------- | -------- | ------------------------------------ | ------- |
121-
| 2 | Host | in | `your-salesforce-domain.example.com` | Isolate |
74+
[Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) may still be preferred in some deployment models. Clientless Web Isolation implicitly isolates all traffic (both IdP and SP) and supports HTTP-POST SAML bindings.
12275

12376
## Browser Isolation is not compatible with private IPs on non-`443` ports
12477

0 commit comments

Comments
 (0)