Skip to content

Commit 7899172

Browse files
ranbelthomasgauvin
authored andcommitted
[ZT] Browser-based RDP WARP auth (#23704)
* allow targets through gateway partial * turn off WARP auth for RDP * fix partial
1 parent 1c133fc commit 7899172

File tree

5 files changed

+26
-11
lines changed

5 files changed

+26
-11
lines changed

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Access for Infrastructure currently only supports [SSH](/cloudflare-one/connecti
4444
<Render file="access/add-infrastructure-app" />
4545

4646
## 3. (Recommended) Modify order of precedence in Gateway
47-
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
47+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target", protocol: "infra"}} />
4848

4949
## 4. Configure the server
5050

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,4 +76,5 @@ The WARP client manages sessions for all non-HTTPS applications. Users will rece
7676
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
7777

7878
## Modify order of precedence in Gateway
79-
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Private App" }} />
79+
80+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Private App", protocol: "private" }} />

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,8 @@ Ensure that only **Allow** or **Block** policies are present. **Bypass** and **S
123123
19. Select **Save**.
124124

125125
## 5. (Recommended) Modify order of precedence in Gateway
126-
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
126+
127+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target", protocol: "rdp" }} />
127128

128129
## 6. Connect as a user
129130

@@ -216,7 +217,7 @@ Cloudflare will not configure user identifiers on the RDP target. Any user ident
216217
## Known limitations
217218

218219
- **TLS certificate verification**: Cloudflare uses TLS to connect to the RDP target but does not verify the origin TLS certificate.
219-
- **WARP authentication**: Users cannot authenticate to RDP targets using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/#configure-warp-sessions-in-access).
220+
- **WARP authentication**: Since browser-based RDP traffic does not go through the WARP client, users cannot use their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/#configure-warp-sessions-in-access) to authenticate.
220221
- **Audio over RDP**: Users cannot use their microphone and speaker to interact with the remote machine.
221222
- **Clipboard controls**: Admins do not have the ability to restrict copy/paste actions between the remote machine and the user's local clipboard.
222223
- **File transfers**: Users cannot copy/paste files from their local machine to the remote machine and vice versa.

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To connect your devices to Cloudflare:
4242
<Render file="access/add-infrastructure-app" />
4343

4444
## 6. (Recommended) Modify order of precedence in Gateway
45-
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
45+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target", protocol: "ssh" }} />
4646

4747
## 7. Configure SSH server
4848

src/content/partials/cloudflare-one/access/modify-gateway-policy-precedence.mdx

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,29 @@
11
---
22
params:
33
- selector
4-
4+
- protocol
55
---
66

7-
By default, Cloudflare will evaluate Access application policies after evaluating all Gateway network policies. To evaluate Access applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
7+
By default, Cloudflare will evaluate Access application policies after evaluating all Gateway network policies. To evaluate Access applications before or after specific Gateway policies:
8+
9+
<ol>
10+
<li>
11+
Create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
12+
13+
| Selector | Operator | Value | Action |
14+
| ---------------------------- | -------- | --------- | ------ |
15+
| {props.selector} | is | _Present_ | Allow |
16+
</li>
17+
18+
{ props.protocol === "rdp" && (<> <li> Ensure that <strong>Enforce WARP client session duration</strong> is turned off, otherwise users will be blocked from accessing RDP targets. </li> </>)}
19+
20+
<li>
21+
Update the policy's [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence) using the dashboard or API.
22+
</li>
823

9-
| Selector | Operator | Value | Action |
10-
| ---------------------------- | -------- | --------- | ------ |
11-
| {props.selector} | is | _Present_ | Allow |
24+
</ol>
1225

13-
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
26+
{ props.selector === "Access Infrastructure Target" && (<p> This Gateway policy will apply to all Access for Infrastructure targets, including RDP and SSH. </p>) }
1427

1528
:::note
1629
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.

0 commit comments

Comments
 (0)