|
| 1 | +--- |
| 2 | +pcx_content_type: how-to |
| 3 | +title: Managed service providers (MSPs) |
| 4 | +sidebar: |
| 5 | + order: 15 |
| 6 | +--- |
| 7 | + |
| 8 | +:::note |
| 9 | +Only available on Enterprise plans. For more information, contact your account team. |
| 10 | +::: |
| 11 | + |
| 12 | +Gateway supports the [Cloudflare Tenant API](/tenant/), which allows Cloudflare-partnered managed service providers (MSPs) to set up and manage Cloudflare accounts and services for their customers. With the Tenant API, MSPs can create Zero Trust deployments with global Gateway policy control. Policies can be customized or overridden at a group or individual account level. |
| 13 | + |
| 14 | +The Tenant platform only supports [DNS policies](/cloudflare-one/policies/gateway/dns-policies/). For more information, refer to the [Cloudflare Zero Trust for managed service providers](https://blog.cloudflare.com/gateway-managed-service-provider/) blog post. |
| 15 | + |
| 16 | +## Get started |
| 17 | + |
| 18 | +{/* Don't need to surface much of the policy creation flow here */} |
| 19 | + |
| 20 | +To set up the Tenant API, refer to [Get started](/tenant/get-started/). Once you have provisioned and configured your customer's Cloudflare accounts, you can create [DNS policies](/cloudflare-one/policies/gateway/dns-policies/). |
| 21 | + |
| 22 | +## Account types |
| 23 | + |
| 24 | +The Gateway Tenant platform supports tiered and siloed account configurations. |
| 25 | + |
| 26 | +### Tiered accounts |
| 27 | + |
| 28 | +In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can override or add policies as needed while still being managed by the parent account. MSPs can also configure child accounts independently from the parent account, including: |
| 29 | + |
| 30 | +- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/) |
| 31 | +- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/) |
| 32 | +- Mapping [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) |
| 33 | +- Creating [lists](/cloudflare-one/policies/gateway/lists/) |
| 34 | + |
| 35 | +Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/). |
| 36 | + |
| 37 | +Gateway evaluates parent account policies before any child account policies. To allow a child account to override a specific parent account policy, you can use the [Update a Zero Trust Gateway rule](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/update/) endpoint to set the policy's `allow_child_bypass` rule setting to `true`. |
| 38 | + |
| 39 | +```mermaid |
| 40 | +flowchart TD |
| 41 | +%% Accessibility |
| 42 | + accTitle: How Gateway policies work in a tiered account configuration |
| 43 | + accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration. |
| 44 | +
|
| 45 | +%% Flowchart |
| 46 | + subgraph s1["Parent account"] |
| 47 | + n1["Block malware"] |
| 48 | + n2["Block DNS tunnel"] |
| 49 | + n3["Block spyware"] |
| 50 | + end |
| 51 | + subgraph s2["Child account A"] |
| 52 | + n4["Block social media"] |
| 53 | + end |
| 54 | + subgraph s3["Child account B"] |
| 55 | + n5["Block instant messaging"] |
| 56 | + end |
| 57 | + n1 ~~~ n2 |
| 58 | + n2 ~~~ n3 |
| 59 | + A["Tenant"] --Administers--> s1 |
| 60 | + s1 -- "Applies policies to" --> s2 & s3 |
| 61 | +
|
| 62 | + n1@{ shape: lean-l} |
| 63 | + n2@{ shape: lean-l} |
| 64 | + n3@{ shape: lean-l} |
| 65 | + n4@{ shape: lean-l} |
| 66 | + n5@{ shape: lean-l} |
| 67 | +``` |
| 68 | + |
| 69 | +### Siloed accounts |
| 70 | + |
| 71 | +In a siloed account configuration, each account operates independently within the same tenant. MSPs manage each account's own security policies, resources, and configurations separately. |
| 72 | + |
| 73 | +```mermaid |
| 74 | +flowchart TD |
| 75 | +%% Accessibility |
| 76 | + accTitle: How Gateway policies work in a siloed account configuration |
| 77 | + accDescr: Flowchart describing the order of precedence Gateway applies policies in a siloed account configuration. |
| 78 | +
|
| 79 | +%% Flowchart |
| 80 | + subgraph s1["Siloed account A"] |
| 81 | + n1["Block social media"] |
| 82 | + end |
| 83 | + subgraph s2["Siloed account C"] |
| 84 | + n2["Block instant messaing"] |
| 85 | + end |
| 86 | + subgraph s3["Siloed account B"] |
| 87 | + n3["Block news"] |
| 88 | + end |
| 89 | + A["Tenant"] -- Administers --> s1 & s3 & s2 |
| 90 | +
|
| 91 | + n1@{ shape: lean-l} |
| 92 | + n2@{ shape: lean-l} |
| 93 | + n3@{ shape: lean-l} |
| 94 | +``` |
0 commit comments