Skip to content

Commit 7151402

Browse files
asamborskiranbelkennyj42
authored
Adding GA announcement for browser-based RDP (#25341)
* Adding GA announcement for browser-based RDP Also I added in the Access product picker for all the changelog entries that didn't have it yet! * Apply suggestions from code review * Update 2025-09-22-browser-based-rdp-ga.mdx * Update 2025-09-22-browser-based-rdp-ga Refining details --------- Co-authored-by: ranbel <[email protected]> Co-authored-by: kennyj42 <[email protected]>
1 parent c01eb30 commit 7151402

7 files changed

+39
-0
lines changed

src/content/changelog/access/2024-10-01-ssh-with-access-for-infrastructure.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: Eliminate long-lived credentials and enhance SSH security with Cloudflare Access for Infrastructure
33
description: Use short-lived SSH certificates and fine-grained policy to secure access to your SSH servers.
44
date: 2024-10-01
5+
products:
6+
- access
57
---
68

79
Organizations can now eliminate long-lived credentials from their SSH setup and enable strong multi-factor authentication for SSH access, similar to other Access applications, all while generating access and command logs.

src/content/changelog/access/2025-01-15-ssh-logs-and-logpush.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: Export SSH command logs with Access for Infrastructure using Logpush
33
description: Easily configure automatic export of SSH command logs to third-party storage destinations or to security information and event management (SIEM) tools.
44
date: 2025-01-15
5+
products:
6+
- access
57
---
68

79
:::note[Availability]

src/content/changelog/access/2025-03-03-saml-oidc-fields-saml-transformations.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: New SAML and OIDC Fields and SAML transforms for Access for SaaS
33
description: Access for SaaS new SAML and OIDC Fields and SAML transforms
44
date: 2025-03-03
5+
products:
6+
- access
57
---
68

79
[Access for SaaS applications](/cloudflare-one/applications/configure-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.

src/content/changelog/access/2025-04-09-SCIM-provisioning-logs.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: Cloudflare Zero Trust SCIM User and Group Provisioning Logs
33
description: View all user and group updates, creation and deletion events made via SCIM across all of your IdP instances in one place
44
date: 2025-04-09
5+
products:
6+
- access
57
---
68

79
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.

src/content/changelog/access/2025-04-21-Access-Bulk-Policy-Tester.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: Access bulk policy tester
33
description: Test and simulate Access policies before deploying them to production. The Access bulk policy tester allows you to test your policies against your entire user population before and after deploying them.
44
date: 2025-04-21
5+
products:
6+
- access
57
---
68

79
The [Access bulk policy tester](/cloudflare-one/policies/access/policy-management/#test-all-policies-in-an-application) is now available in the Cloudflare Zero Trust dashboard. The bulk policy tester allows you to simulate Access policies against your entire user base before and after deploying any changes. The policy tester will simulate the configured policy against each user's last seen identity and device posture (if applicable).

src/content/changelog/access/2025-07-01-browser-based-rdp-open-beta.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
title: Access RDP securely from your browser — now in open beta
33
description: Connect to internal Windows servers via a web browser — no VPN or RDP client required.
44
date: 2025-07-01
5+
products:
6+
- access
57
---
68

79
[Browser-based RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser/) with [Cloudflare Access](/cloudflare-one/policies/access/) is now available in open beta for all Cloudflare customers. It enables secure, remote Windows server access without VPNs or RDP clients.
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: Access Remote Desktop Protocol (RDP) destinations securely from your browser — now generally available!
3+
description: Connect to internal Windows servers via a web browser — no VPN or RDP client required.
4+
date: 2025-09-22
5+
products:
6+
- access
7+
---
8+
9+
[Browser-based RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser/) with [Cloudflare Access](/cloudflare-one/policies/access/) is now generally available for all Cloudflare customers. It enables secure, remote Windows server access without VPNs or RDP clients.
10+
11+
Since we announced our [open beta](/changelog/access/#2025-06-30), we've made a few improvements:
12+
- Support for targets with IPv6.
13+
- Support for [Magic WAN](/magic-wan/) and [WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/) as on-ramps.
14+
- More robust error messaging on the login page to help you if you encounter an issue.
15+
- Worldwide keyboard support. Whether your day-to-day is in Portuguese, Chinese, or something in between, your browser-based RDP experience will look and feel exactly like you are using a desktop RDP client.
16+
- Cleaned up some other miscellaneous issues, including but not limited to enhanced support for Entra ID accounts and support for usernames with spaces, quotes, and special characters.
17+
18+
As a refresher, here are some benefits browser-based RDP provides:
19+
20+
- **Control how users authenticate to internal RDP resources** with single sign-on (SSO), multi-factor authentication (MFA), and granular access policies.
21+
- **Record who is accessing which servers and when** to support regulatory compliance requirements and to gain greater visibility in the event of a security event.
22+
- **Eliminate the need to install and manage software on user devices**. You will only need a web browser.
23+
- **Reduce your attack surface** by keeping your RDP servers off the public Internet and protecting them from common threats like credential stuffing or brute-force attacks.
24+
25+
![Example of a browser-based RDP Access application](~/assets/images/changelog/access/browser-based-rdp-access-app.png)
26+
27+
To get started, refer to [Connect to RDP in a browser](/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser/).

0 commit comments

Comments
 (0)