You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2.[Get](/api/resources/zero_trust/subresources/access/subresources/applications/methods/list/) the `id` of the `dash_sso` Access application. You can use [`jq`](https://jqlang.github.io/jq/download/) to quickly find the correct application:
@@ -211,8 +211,8 @@ To get the domain of a proxy endpoint:
211
211
1. Use the [List proxy endpoints](/api/resources/zero_trust/subresources/gateway/subresources/proxy_endpoints/methods/list/) operation to get a list of your proxy endpoints and their details. For example:
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles.mdx
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,9 +35,8 @@ Your profile will appear in the **Profile settings** list. You can rearrange the
35
35
Send a `POST` request to the [Devices endpoint](/api/resources/zero_trust/subresources/devices/subresources/policies/subresources/custom/methods/create/):
@@ -280,8 +280,8 @@ If your tunnel token is compromised, we recommend taking the following steps:
280
280
2.[Delete all connections](/api/resources/zero_trust/subresources/tunnels/subresources/connections/methods/delete/) between `cloudflared` and Cloudflare:
[Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) provides granular control over how users can connect to your SSH servers. This feature uses the same deployment model as [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/) but unlocks more policy options and command logging functionality.
15
15
16
-
<Renderfile="access/short-lived-certs-intro"params={{ intro: "Furthermore, Access for Infrastructure replaces" }} />
16
+
<Render
17
+
file="access/short-lived-certs-intro"
18
+
params={{ intro: "Furthermore, Access for Infrastructure replaces" }}
19
+
/>
17
20
18
21
## 1. Connect the server to Cloudflare
19
22
@@ -31,8 +34,7 @@ To connect your devices to Cloudflare:
@@ -55,9 +57,11 @@ To generate a Cloudflare SSH CA and get its public key:
55
57
<Renderfile="ssh/ssh-proxy-ca" />
56
58
57
59
### Save the public key
60
+
58
61
<Renderfile="ssh/public-key" />
59
62
60
63
### Modify your SSHD config
64
+
61
65
<Renderfile="ssh/modify-sshd" />
62
66
63
67
:::note
@@ -66,9 +70,11 @@ For certain distributions, such as Amazon Linux 1 (based on RHEL), the certifica
66
70
```sh
67
71
chmod 600 /etc/ssh/ca.pub
68
72
```
73
+
69
74
:::
70
75
71
76
### Restart your SSH server
77
+
72
78
<Renderfile="ssh/restart-server" />
73
79
74
80
## 7. Connect as a user
@@ -112,13 +118,13 @@ Cloudflare will stop logging SSH commands to your targets, as well as any comman
112
118
To delete the SSH encryption public key using the [API](/api/resources/zero_trust/subresources/gateway/subresources/audit_ssh_settings/methods/update/):
113
119
114
120
```sh
115
-
curl --request PUT https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/audit_ssh_settings \
116
-
--header "X-Auth-Email: <EMAIL>" \
117
-
--header "X-Auth-Key: <API_KEY>" \
121
+
curl --request PUT https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/audit_ssh_settings \
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
40
+
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
41
41
42
-

42
+

43
43
44
-
8. Select **Register**.
44
+
8.Select **Register**.
45
45
46
-
9. Next, return to Microsoft Entra ID and go to go to **Manage** > **App registrations**.
46
+
9.Next, return to Microsoft Entra ID and go to go to **Manage** > **App registrations**.
47
47
48
48
10. Select the app you just created. Copy the **Application (client) ID** and **Directory (tenant) ID**.
49
49
@@ -53,11 +53,9 @@ To retrieve those values:
53
53
54
54
12. Name the client secret and choose an expiration period.
55
55
56
-
:::note
57
-
58
-
When the client secret expires, users will be unable to log in through Access. Take note of your expiry date to prevent login errors and renew your client secret when necessary.
59
-
60
-
:::
56
+
:::note
57
+
When the client secret expires, users will be unable to log in through Access. Take note of your expiry date to prevent login errors and renew your client secret when necessary.
58
+
:::
61
59
62
60
13. After the client secret is created, copy its **Value** field. Store the client secret in a safe place, as it can only be viewed immediately after creation.
63
61
@@ -118,40 +116,42 @@ To [test](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) tha
118
116
119
117
</TabItem> <TabItemlabel="API">
120
118
121
-
1.[Create an API token](/fundamentals/api/get-started/create-token/) with the following permissions:
122
-
| Type | Item | Permission |
123
-
| ------- | ---------------- | ---------- |
124
-
| Account | Access: Organizations, Identity Providers, and Groups | Edit |
125
-
126
-
2. Make a `POST` request to the [Identity Providers](/api/resources/zero_trust/subresources/identity_providers/methods/create/) endpoint:
The following example requires Cloudflare provider version `>=4.40.0`.
147
146
:::
148
147
149
-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
150
-
-`Access: Organizations, Identity Providers, and Groups Write`
148
+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
149
+
150
+
-`Access: Organizations, Identity Providers, and Groups Write`
151
151
152
-
2. Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
152
+
2.Configure the [`cloudflare_zero_trust_access_identity_provider`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_access_identity_provider) resource:
153
153
154
-
<Renderfile="access/entra-id-terraform" />
154
+
<Renderfile="access/entra-id-terraform" />
155
155
156
156
</TabItem> </Tabs>
157
157
@@ -185,7 +185,7 @@ The Microsoft Entra ID integration allows you to synchronize IdP groups and auto
@@ -274,11 +274,12 @@ Access and Gateway policies for an Entra group will also apply to all [nested gr
274
274
You can require users to re-enter their credentials into Entra ID whenever they [re-authenticate their WARP session](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). To configure this setting:
275
275
276
276
1. Make a `GET` request to the [Identity Providers endpoint](/api/resources/zero_trust/subresources/identity_providers/) and copy the response for the Entra ID identity provider.
277
-
2.[Update the Entra ID identity provider](/api/resources/zero_trust/subresources/identity_providers/methods/update/) using a `PUT` request. In the request body, include all existing configurations and set the `prompt` parameter to either `login` or `select_account`. For example,
277
+
2.[Update the Entra ID identity provider](/api/resources/zero_trust/subresources/identity_providers/methods/update/) using a `PUT` request. In the request body, include all existing configurations and set the `prompt` parameter to either `login` or `select_account`. For example:
0 commit comments