Skip to content

Commit 681d558

Browse files
authored
[Gateway] MSP (#19924)
1 parent cf95456 commit 681d558

File tree

8 files changed

+101
-15
lines changed

8 files changed

+101
-15
lines changed

src/content/docs/cloudflare-one/policies/gateway/application-app-types.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Applications and app types
44
sidebar:
5-
order: 8
5+
order: 9
66
---
77

88
import { GlossaryDefinition, GlossaryTooltip } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/block-page.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: how-to
33
title: Block page
44
sidebar:
5-
order: 11
5+
order: 14
66
banner:
77
content: The default global Cloudflare root certificate expired on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
88
---

src/content/docs/cloudflare-one/policies/gateway/domain-categories.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Domain categories
44
sidebar:
5-
order: 9
5+
order: 10
66
---
77

88
import { Render } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/global-policies.mdx

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
pcx_content_type: reference
33
title: Global policies
44
sidebar:
5-
order: 7
6-
5+
order: 8
76
---
87

98
Cloudflare Zero Trust applies a set of global policies to all accounts.
@@ -14,8 +13,6 @@ The following policies are sorted by [order of precedence](/cloudflare-one/polic
1413

1514
## Network proxy policies
1615

17-
18-
1916
| Name | ID | Criteria | Value | Action | Description |
2017
| --------------------------------- | -------------------------------------- | -------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------ | -------------------------------------------------------------------------------------------------------- |
2118
| Allow CF Network Error Logging L4 | `00000001-e4af-4b82-8f8c-c79c1d5d212e` | Hostname | `*.nel.cloudflare.com` | allow | Allows SNI domains for WARP registration. |
@@ -24,12 +21,8 @@ The following policies are sorted by [order of precedence](/cloudflare-one/polic
2421
| Allow Zero Trust Services | `00000001-e1e8-421b-a0fe-895397489f28` | Hostname | `dash.teams.cloudflare.com`, `help.teams.cloudflare.com`, `blocked.teams.cloudflare.com`, `api.cloudflare.com`, `cloudflarestatus.com`, `www.cloudflarestatus.com`, and `one.dash.cloudflare.com` | allow | Allows Cloudflare Zero Trust services. |
2522
| Allow Access Apps L4 | `00000001-daa2-41e2-8a88-698af4066951` | Hostname | `*.cloudflareaccess.com` | allow | Allows [Cloudflare Access](/cloudflare-one/policies/access/) applications. |
2623

27-
28-
2924
## HTTP inspection policies
3025

31-
32-
3326
| Name | ID | Criteria | Value | Action | Description |
3427
| -------------------------------------- | -------------------------------------- | ---------------- | ------------------------------------------------------------------ | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------- |
3528
| Prevent Account Change Block | `00000001-d1f2-461a-8253-501c8d882a15` | Hostname | `*.cloudflareclient.com` | bypass | Ensures users cannot accidentally block themselves from making account changes. |
@@ -49,4 +42,3 @@ The following policies are sorted by [order of precedence](/cloudflare-one/polic
4942
| Always Blocked Categories | `00000001-bed5-462e-b0f1-2e2c3555e9f7` | Content Category | Child Abuse | block | Blocks child abuse materials. |
5043
| Don't Isolate RBI Help Pages | `00000001-1a18-431f-9c9d-bce431f1002a` | Hostname | `developers.cloudflare.com` and `help.cloudflarebrowser.com` | noisolate | Prevents browser isolation of Cloudflare developer docs and help pages to help users troubleshoot configuration issues. |
5144
| Don't AV Scan CF Speed | `00000001-c194-408f-87dd-9a366ce76e12` | Hostname | `speed.cloudflare.com` | noscan | Allows files transferred by the Cloudflare speed test. |
52-

src/content/docs/cloudflare-one/policies/gateway/identity-selectors.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Identity-based policies
44
sidebar:
5-
order: 10
5+
order: 7
66
---
77

88
import { Render } from "~/components";
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Managed service providers (MSPs)
4+
sidebar:
5+
order: 15
6+
---
7+
8+
:::note
9+
Only available on Enterprise plans. For more information, contact your account team.
10+
:::
11+
12+
Gateway supports the [Cloudflare Tenant API](/tenant/), which allows Cloudflare-partnered managed service providers (MSPs) to set up and manage Cloudflare accounts and services for their customers. With the Tenant API, MSPs can create Zero Trust deployments with global Gateway policy control. Policies can be customized or overridden at a group or individual account level.
13+
14+
The Tenant platform only supports [DNS policies](/cloudflare-one/policies/gateway/dns-policies/). For more information, refer to the [Cloudflare Zero Trust for managed service providers](https://blog.cloudflare.com/gateway-managed-service-provider/) blog post.
15+
16+
## Get started
17+
18+
{/* Don't need to surface much of the policy creation flow here */}
19+
20+
To set up the Tenant API, refer to [Get started](/tenant/get-started/). Once you have provisioned and configured your customer's Cloudflare accounts, you can create [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
21+
22+
## Account types
23+
24+
The Gateway Tenant platform supports tiered and siloed account configurations.
25+
26+
### Tiered accounts
27+
28+
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can override or add policies as needed while still being managed by the parent account. MSPs can also configure child accounts independently from the parent account, including:
29+
30+
- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/)
31+
- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/)
32+
- Mapping [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/)
33+
- Creating [lists](/cloudflare-one/policies/gateway/lists/)
34+
35+
Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
36+
37+
Gateway evaluates parent account policies before any child account policies. To allow a child account to override a specific parent account policy, you can use the [Update a Zero Trust Gateway rule](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/update/) endpoint to set the policy's `allow_child_bypass` rule setting to `true`.
38+
39+
```mermaid
40+
flowchart TD
41+
%% Accessibility
42+
accTitle: How Gateway policies work in a tiered account configuration
43+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration.
44+
45+
%% Flowchart
46+
subgraph s1["Parent account"]
47+
n1["Block malware"]
48+
n2["Block DNS tunnel"]
49+
n3["Block spyware"]
50+
end
51+
subgraph s2["Child account A"]
52+
n4["Block social media"]
53+
end
54+
subgraph s3["Child account B"]
55+
n5["Block instant messaging"]
56+
end
57+
n1 ~~~ n2
58+
n2 ~~~ n3
59+
A["Tenant"] --Administers--> s1
60+
s1 -- "Applies policies to" --> s2 & s3
61+
62+
n1@{ shape: lean-l}
63+
n2@{ shape: lean-l}
64+
n3@{ shape: lean-l}
65+
n4@{ shape: lean-l}
66+
n5@{ shape: lean-l}
67+
```
68+
69+
### Siloed accounts
70+
71+
In a siloed account configuration, each account operates independently within the same tenant. MSPs manage each account's own security policies, resources, and configurations separately.
72+
73+
```mermaid
74+
flowchart TD
75+
%% Accessibility
76+
accTitle: How Gateway policies work in a siloed account configuration
77+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a siloed account configuration.
78+
79+
%% Flowchart
80+
subgraph s1["Siloed account A"]
81+
n1["Block social media"]
82+
end
83+
subgraph s2["Siloed account C"]
84+
n2["Block instant messaing"]
85+
end
86+
subgraph s3["Siloed account B"]
87+
n3["Block news"]
88+
end
89+
A["Tenant"] -- Administers --> s1 & s3 & s2
90+
91+
n1@{ shape: lean-l}
92+
n2@{ shape: lean-l}
93+
n3@{ shape: lean-l}
94+
```

src/content/docs/cloudflare-one/policies/gateway/order-of-enforcement.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: concept
33
title: Order of enforcement
44
sidebar:
5-
order: 12
5+
order: 11
66
---
77

88
import { Render } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/proxy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: concept
33
title: Proxy
44
sidebar:
5-
order: 14
5+
order: 12
66
---
77

88
import { Badge } from "~/components";

0 commit comments

Comments
 (0)