Skip to content

Commit 6c7eea6

Browse files
committed
update descriptions
1 parent 7bcab94 commit 6c7eea6

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
1818

1919
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
2020
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
21+
- (Optional) Turn on [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) if you want to use Access JWTs to manage [HTTPS application sessions](#https-applications).
2122

2223
## Add your application to Access
2324

@@ -57,7 +58,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
5758

5859
12. Select **Next**.
5960

60-
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require Gateway TLS decryption.
61+
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
6162

6263
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
6364
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
@@ -70,14 +71,17 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
7071

7172
Users can now connect to your private application after authenticating with Cloudflare Access.
7273

73-
## Login page
74+
## Authentication flow
7475

75-
### Browser notification
76+
### HTTPS applications
7677

77-
To prompt users to login in the browser, [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled. When the user connects to your private hostname or IP, Access will open your [login page](/cloudflare-one/applications/login-page/) and issue an authorization JWT to your origin.
78+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned on and a user is accessing an HTTPS application on port `443`, Cloudflare Access will present a login page in the browser and issue an [application token](/cloudflare-one/identity/authorization-cookie/application-token/) to your origin. This is the same cookie-based authentication flow used by [self-hosted public apps](/cloudflare-one/applications/configure-apps/self-hosted-public-app/).
7879

79-
### System notification
80-
If you do not turn on [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), users will receive a pop-up notification from the WARP client and all session management will be handled in the WARP client.
80+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned off, session management is [handled in the WARP client](#non-https-applications) instead of in the browser.
81+
82+
### Non-HTTPS applications
83+
84+
The WARP client manages sessions for all non-HTTPS applications. Users will receive an `Authentication required` pop-up notification from the WARP client. When the user selects the notification, WARP will open a browser window with your Access login page.
8185

8286
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
8387

0 commit comments

Comments
 (0)