Skip to content

Commit 5f88eee

Browse files
committed
update Overview
1 parent 5ddaeb9 commit 5f88eee

File tree

8 files changed

+38
-56
lines changed

8 files changed

+38
-56
lines changed

src/content/docs/cloudflare-one/implementation-guides/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Implementation guides cover deployment steps and best practices for specific Clo
3131
</LinkTitleCard>
3232

3333
<LinkTitleCard
34-
title="Deploy Zero Trust Web Access"
34+
title="Deploy Clientless Access"
3535
href="/learning-paths/zero-trust-web-access/concepts/"
3636
icon="laptop"
3737
>

src/content/docs/cloudflare-one/implementation-guides/zero-trust-web-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: navigation
3-
title: Deploy Zero Trust Web Access
3+
title: Deploy Clientless Access
44
external_link: /learning-paths/zero-trust-web-access/concepts/
55
sidebar:
66
order: 3
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
title: What is clientless access?
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 1
6+
7+
---
8+
9+
Clientless access is a deployment option of a [Zero Trust Network Access (ZTNA)](https://www.cloudflare.com/learning/access-management/what-is-ztna/) service that provides secure access to internal applications without requiring end users to install any software. Users access corporate resources like intranet web apps, SSH terminals, and Windows servers through RDP from their web browser. Clientless access is commonly used to provide internal, least-privilege access to users on unmanaged devices. Users may include third-party contractors, suppliers, and partners, or employees using personal mobile phones as part of an organization's bring-your-own-device (BYOD) policy.
10+
11+
IT/security admins can decide how users authenticate, whether through their corporate identity provider, social media accounts, a PIN sent to their email, strong MFA, or a combination of options. Admins can also add inline services like Remote Browser Isolation (RBI) and Data Loss Prevention (DLP) to help prevent data exfiltration from unmanaged devices, still through a clientless implementation. Isolated apps can enforce broad data controls through the browser, such as preventing uploads/downloads or copy/paste, or incorporating DLP policies.
12+
13+
## Alternatives to clientless access
14+
15+
### Device client
16+
17+
A device client enables additional capabilities for a ZTNA deployment, like adding full device posture checks to policy evaluations or providing access to private network resources on private hostnames. However, when extending access to third-party or temporary workers, some organizations are reluctant to buy and ship company-managed devices or onboard clients to users' personal devices. Some IT or security teams may have rigorous device compatibility, interoperability, or other software audit processes that could delay user onboarding for a ZTNA rollout. Contractors may also not allow external company software to be installed on their personal devices, whether a legacy VPN or a more modern software client.
18+
19+
### Identity provider integration
20+
21+
Some organizations historically have created corporate identities for third-party users within their internal identity provider, or they have spent the time to integrate a third-party's external identity provider with their own. Time and complexity for this work aside, not all resources integrate directly with traditional identity and access management (IAM) products, so a tool like ZTNA can still be needed to aggregate access logistics more broadly across an organization's internal resources.
22+
23+
### Enterprise browsers
24+
25+
Enterprise browsers are another tool sparking interest in the industry for hybrid work and internal access use cases. They aim to consolidate security features and provide similar unified access and data protection to resources, all through a managed browser. However, some users may not want to disrupt their preferred workflows through their existing browser(s), and some third parties may still not wish to install any external software including the managed browser.
26+
27+
## Why Cloudflare for clientless access
28+
29+
One of the biggest challenges in delivering clientless, secure remote access is making it feel native for your end users. Solutions have existed for decades which operate in a way that breaks TLS on a firewall or creates a picture-in-a-picture to access an internal web service. These legacy solutions make it very difficult to apply traditional web security concepts to private apps.
30+
31+
In contrast, Cloudflare is a leading [reverse proxy](https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/) provider for public-facing web assets, proxying approximately [20% of all websites](https://w3techs.com/technologies/overview/proxy). Together with our SASE platform, this establishes a unique position for Cloudflare to deliver performant browser-based security for both public and private resources. There is no additional overhead in implementation, management, ongoing updates, or routing.
32+
33+
Clientless access accelerates user onboarding for your admins, and it makes private apps feel just like SaaS apps for your end users. Many organizations roll out clientless access use cases toward the start of their larger SASE architecture journey as a “quick win” to develop momentum for a longer [VPN replacement](/learning-paths/replace-vpn/concepts/) project or security modernization initiative.

src/content/docs/learning-paths/zero-trust-web-access/concepts/index.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,10 @@ sidebar:
66

77
---
88

9-
Review the concepts behind Zero Trust Web Access.
9+
Review the concepts behind clientless access.
1010

1111
## Objectives
1212

1313
By the end of this module, you will be able to:
1414

15-
* Understand the purpose and benefits of a reverse proxy server.
16-
* Describe the main principles of Zero Trust security.
17-
* Understand how Zero Trust Web Access fits into a Zero Trust security model.
15+
- Understand the purpose and benefits of clientless access.

src/content/docs/learning-paths/zero-trust-web-access/concepts/reverse-proxy-server.mdx

Lines changed: 0 additions & 13 deletions
This file was deleted.

src/content/docs/learning-paths/zero-trust-web-access/concepts/zero-trust-web-access.mdx

Lines changed: 0 additions & 23 deletions
This file was deleted.

src/content/docs/learning-paths/zero-trust-web-access/concepts/zero-trust.mdx

Lines changed: 0 additions & 13 deletions
This file was deleted.

src/content/learning-paths/zero-trust-web-access.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"title": "Deploy Zero Trust Web Access",
2+
"title": "Deploy Clientless Access",
33
"path": "/learning-paths/zero-trust-web-access/concepts/",
44
"priority": 2,
55
"description": "Secure access to internal web applications without a device client.",

0 commit comments

Comments
 (0)