Skip to content

Commit 5396ff0

Browse files
committed
Fix Gateway policy formatting
1 parent 9f43e86 commit 5396ff0

File tree

2 files changed

+31
-33
lines changed

2 files changed

+31
-33
lines changed

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -127,12 +127,11 @@ The following [Access policy selectors](/cloudflare-one/policies/access/#selecto
127127

128128
By default, Cloudflare will evaluate an Infrastructure application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
129129

130+
| Selector | Operator | Value | Action |
131+
| ---------------------- | -------- | ----- | ------ |
132+
| All Access App Targets | is | on | Allow |
130133

131-
| Selector | Operator | Value | Action |
132-
| -------- | -------- | ------------ | ------ |
133-
| All Access App Targets | is | `Enabled` | Allow |
134-
135-
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
134+
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
136135

137136
:::note
138137
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Add a self-hosted private application
77
---
88

9-
import { Render } from "~/components"
9+
import { Render } from "~/components";
1010

1111
You can configure a self-hosted Access application to manage access to specific IPs or hostnames on your private network.
1212

@@ -22,35 +22,35 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
2222

2323
## Add your application to Access
2424

25-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
25+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
2626

27-
2. Select **Add an application**.
27+
2. Select **Add an application**.
2828

29-
3. Select **Self-hosted**.
29+
3. Select **Self-hosted**.
3030

31-
4. Enter any name for the application.
31+
4. Enter any name for the application.
3232

33-
5. In **Session Duration**, choose how often the user's [application token](/cloudflare-one/identity/authorization-cookie/application-token/) should expire.
33+
5. In **Session Duration**, choose how often the user's [application token](/cloudflare-one/identity/authorization-cookie/application-token/) should expire.
3434

35-
Cloudflare checks every HTTPS request to your application for a valid application token. If the user's application token (and global token) has expired, they will be prompted to reauthenticate with the IdP. For more information, refer to [Session management](/cloudflare-one/identity/users/session-management/). If the application is non-HTTPS or you do not have TLS decryption turned on, the session is tracked by the WARP client per application.
35+
Cloudflare checks every HTTPS request to your application for a valid application token. If the user's application token (and global token) has expired, they will be prompted to reauthenticate with the IdP. For more information, refer to [Session management](/cloudflare-one/identity/users/session-management/). If the application is non-HTTPS or you do not have TLS decryption turned on, the session is tracked by the WARP client per application.
3636

37-
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/policies/access/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
37+
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/policies/access/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
3838

39-
:::note
40-
Private hostnames are currently only available over port `443` over HTTPS and the application must have a valid Server Name Indicator (SNI).
41-
:::
39+
:::note
40+
Private hostnames are currently only available over port `443` over HTTPS and the application must have a valid Server Name Indicator (SNI).
41+
:::
4242

43-
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application. All Access applications are deny by default -- a user must match an Allow policy before they are granted access.
43+
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application. All Access applications are deny by default -- a user must match an Allow policy before they are granted access.
4444

45-
8. Configure how users will authenticate:
45+
8. Configure how users will authenticate:
4646

47-
1. Select the [**Identity providers**](/cloudflare-one/identity/idp-integration/) you want to enable for your application.
47+
1. Select the [**Identity providers**](/cloudflare-one/identity/idp-integration/) you want to enable for your application.
4848

49-
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
49+
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
5050

51-
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
51+
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
5252

53-
9. Select **Next**.
53+
9. Select **Next**.
5454

5555
10. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.
5656

@@ -60,12 +60,12 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
6060

6161
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require Gateway TLS decryption.
6262

63-
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
64-
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
65-
- **Browser rendering settings**:
66-
- [Automatic `cloudflared` authentication](/cloudflare-one/applications/non-http/cloudflared-authentication/automatic-cloudflared-authentication/)
67-
- [Browser rendering for SSH and VNC](/cloudflare-one/applications/non-http/browser-rendering/)
68-
- **401 Response for Service Auth policies**: Return a `401` response code when a user (or machine) makes a request to the application without the correct [service token](/cloudflare-one/identity/service-tokens/).
63+
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
64+
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
65+
- **Browser rendering settings**:
66+
- [Automatic `cloudflared` authentication](/cloudflare-one/applications/non-http/cloudflared-authentication/automatic-cloudflared-authentication/)
67+
- [Browser rendering for SSH and VNC](/cloudflare-one/applications/non-http/browser-rendering/)
68+
- **401 Response for Service Auth policies**: Return a `401` response code when a user (or machine) makes a request to the application without the correct [service token](/cloudflare-one/identity/service-tokens/).
6969

7070
14. Select **Save**.
7171

@@ -75,12 +75,11 @@ Users can now connect to your private application after authenticating with Clou
7575

7676
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
7777

78+
| Selector | Operator | Value | Action |
79+
| ----------------------------------- | -------- | ----- | ------ |
80+
| All Access App Private Destinations | is | on | Allow |
7881

79-
| Selector | Operator | Value | Action |
80-
| -------- | -------- | ------------ | ------ |
81-
| All Access Private App Destinations | is | `Enabled` | Allow |
82-
83-
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
82+
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
8483

8584
:::note
8685
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.

0 commit comments

Comments
 (0)