Skip to content

Commit 7c0781a

Browse files
[Cloudflare One] Add secure private apps get started pages (#29028)
* [Cloudflare One] Add secure private apps get-started pages (PCX-20919, PCX-20920, PCX-20922) Add get-started pages for the three 'Securely access private web apps without an agent' dashboard wizard flows: - Private web application (6-step wizard) - Clientless SSH (6-step wizard) - In-browser remote desktop (6-step wizard) Steps 2-6, recommended next steps, and troubleshoot are identical across all three flows and extracted into a shared partial. Each page has a flow-specific Step 1 (different input fields per protocol). Also adds the navigation index page with cards for all three flows, and updates the parent setup index to point to the new section. * [Cloudflare One] Add cross-references to full SSH and RDP guides Link to the detailed browser-based RDP and SSH guides from the How it works sections. These cover limitations, supported OS versions, and advanced configuration that the get-started pages do not.
1 parent 0a7c38b commit 7c0781a

File tree

6 files changed

+271
-1
lines changed

6 files changed

+271
-1
lines changed

src/content/docs/cloudflare-one/setup/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ These use cases match the guided onboarding in the [Cloudflare One dashboard](ht
3939

4040
<LinkTitleCard
4141
title="Secure private apps without a client"
42-
href="/learning-paths/clientless-access/concepts/"
42+
href="/cloudflare-one/setup/secure-private-apps/"
4343
icon="laptop"
4444
>
4545
Provide browser-based access to internal web applications, SSH servers, and
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
pcx_content_type: get-started
3+
title: "Clientless SSH"
4+
sidebar:
5+
order: 2
6+
label: Clientless SSH
7+
description: Provide in-browser SSH access to an internal server through Cloudflare Access.
8+
products:
9+
- cloudflare-one
10+
tags:
11+
- Private networks
12+
---
13+
14+
import { Render } from "~/components";
15+
16+
Provide secure, in-browser command line access to an internal server without SSH client software on the user's device. This is useful when you need to give developers or IT staff remote access to servers for administration or troubleshooting from any browser.
17+
18+
To explore other access scenarios, refer to [Secure private apps](/cloudflare-one/setup/secure-private-apps/).
19+
20+
This guide follows the same steps as the **Get Started** experience in the [Cloudflare One dashboard](https://one.dash.cloudflare.com).
21+
22+
## How it works
23+
24+
[Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/) connects your private network to Cloudflare without opening any ports on your network. You install `cloudflared`, a connector service that runs in the background, on a device that can reach your server. It creates a secure connection from your network out to Cloudflare, so no firewall changes are required.
25+
26+
[Cloudflare Access](/cloudflare-one/access-controls/) sits in front of the server and verifies who each user is before letting them through. Users sign in through a browser using an email one-time PIN or your identity provider, then interact with the server through an in-browser terminal.
27+
28+
For details on connection methods and advanced configuration, refer to [Connect to SSH in the browser](/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-browser-rendering/).
29+
30+
## Prerequisites
31+
32+
- A Cloudflare account with a Zero Trust organization. If you have not set this up, refer to [Get started](/cloudflare-one/setup/).
33+
- An [active domain on your Cloudflare account](/fundamentals/manage-domains/add-site/). A public subdomain is created on this domain for your application.
34+
- A Linux, Windows, or macOS device on your private network that can reach the server. This is where you install the tunnel.
35+
- A server on your private network with SSH enabled.
36+
37+
## Step 1: Define your application
38+
39+
In this step, you describe the internal server you want to make available through Cloudflare.
40+
41+
1. In [Cloudflare One](https://one.dash.cloudflare.com), select the **Get Started** tab.
42+
2. For **Securely access private web apps without an agent**, select **Get started**.
43+
3. For **Configure clientless SSH access to an internal service**, select **Continue**.
44+
4. On the **Zero Trust SSH terminal directly from your browser** screen, select **Continue**.
45+
5. Enter a name for your application.
46+
6. Enter the hostname or IP address of the server. Use the IP address if you are not sure (for example, `10.10.1.25`).
47+
7. Enter the SSH port (the default is `22`).
48+
8. Select **Continue**.
49+
50+
<Render
51+
file="access/secure-private-apps-shared-steps"
52+
product="cloudflare-one"
53+
/>
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
pcx_content_type: get-started
3+
title: "In-browser remote desktop"
4+
sidebar:
5+
order: 3
6+
label: In-browser remote desktop
7+
description: Provide in-browser remote desktop access to Windows hosts through Cloudflare Access.
8+
products:
9+
- cloudflare-one
10+
tags:
11+
- Private networks
12+
- Windows
13+
---
14+
15+
import { Render } from "~/components";
16+
17+
Provide secure, in-browser remote desktop access to Windows hosts without Remote Desktop Protocol (RDP) client software on the user's device. This is useful when you need to give IT staff or support teams remote access to Windows machines for administration or troubleshooting from any browser.
18+
19+
To explore other access scenarios, refer to [Secure private apps](/cloudflare-one/setup/secure-private-apps/).
20+
21+
This guide follows the same steps as the **Get Started** experience in the [Cloudflare One dashboard](https://one.dash.cloudflare.com).
22+
23+
## How it works
24+
25+
[Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/) connects your private network to Cloudflare without opening any ports on your network. You install `cloudflared`, a connector service that runs in the background, on a device that can reach the Windows host. It creates a secure connection from your network out to Cloudflare, so no firewall changes are required.
26+
27+
[Cloudflare Access](/cloudflare-one/access-controls/) sits in front of the host and verifies who each user is before letting them through. Users sign in through a browser using an email one-time PIN or your identity provider, then interact with the Windows desktop through an in-browser remote desktop session.
28+
29+
For details on supported operating systems, connection methods, and known limitations, refer to [Connect to RDP in a browser](/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/).
30+
31+
## Prerequisites
32+
33+
- A Cloudflare account with a Zero Trust organization. If you have not set this up, refer to [Get started](/cloudflare-one/setup/).
34+
- An [active domain on your Cloudflare account](/fundamentals/manage-domains/add-site/). A public subdomain is created on this domain for your application.
35+
- A Linux, Windows, or macOS device on your private network that can reach the Windows host. This is where you install the tunnel.
36+
- A Windows host on your private network that accepts Remote Desktop connections.
37+
38+
## Step 1: Define your application
39+
40+
In this step, you describe the Windows host you want to make available through Cloudflare.
41+
42+
1. In [Cloudflare One](https://one.dash.cloudflare.com), select the **Get Started** tab.
43+
2. For **Securely access private web apps without an agent**, select **Get started**.
44+
3. For **Enable in-browser remote desktop sessions to Windows hosts**, select **Continue**.
45+
4. On the **Zero Trust RDP client directly from your browser** screen, select **Continue**.
46+
5. Enter a name for your application.
47+
6. Enter the local IP address of the Windows host (for example, `10.10.1.25`).
48+
7. Enter the RDP port (the default is `3389`).
49+
8. Select **Continue**.
50+
51+
<Render
52+
file="access/secure-private-apps-shared-steps"
53+
product="cloudflare-one"
54+
/>
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
pcx_content_type: navigation
3+
title: Secure private apps
4+
sidebar:
5+
order: 2
6+
description: Provide browser-based access to internal web applications, SSH servers, and remote desktops without installing software on user devices.
7+
---
8+
9+
import { CardGrid, LinkTitleCard } from "~/components";
10+
11+
Cloudflare Access lets users reach internal applications through a browser without a VPN or client software on their device. You connect your application to Cloudflare using a secure connection called a tunnel, then protect it with policies that control who can access it. For more background, refer to [What is clientless access?](/learning-paths/clientless-access/concepts/what-is-clientless-access/).
12+
13+
How you set this up depends on the type of application you are securing. Choose the scenario that matches your use case:
14+
15+
<CardGrid>
16+
17+
<LinkTitleCard
18+
title="Private web application"
19+
href="/cloudflare-one/setup/secure-private-apps/private-web-app/"
20+
icon="laptop"
21+
>
22+
Connect an internal web application to Cloudflare and control who can access
23+
it. Best for applications like company intranets, internal wikis, or admin
24+
panels.
25+
</LinkTitleCard>
26+
27+
<LinkTitleCard
28+
title="Clientless SSH"
29+
href="/cloudflare-one/setup/secure-private-apps/clientless-ssh/"
30+
icon="seti:shell"
31+
>
32+
Provide in-browser command line access to an internal server without SSH
33+
client software on the user's device.
34+
</LinkTitleCard>
35+
36+
<LinkTitleCard
37+
title="In-browser remote desktop"
38+
href="/cloudflare-one/setup/secure-private-apps/in-browser-rdp/"
39+
icon="seti:windows"
40+
>
41+
Provide in-browser remote desktop access to Windows hosts without remote
42+
desktop client software on the user's device.
43+
</LinkTitleCard>
44+
45+
</CardGrid>
46+
47+
:::note
48+
49+
For in-depth guidance on clientless access and advanced configuration, refer to the [Clientless access learning path](/learning-paths/clientless-access/concepts/what-is-clientless-access/).
50+
:::
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
pcx_content_type: get-started
3+
title: "Private web application"
4+
sidebar:
5+
order: 1
6+
label: Private web application
7+
description: Connect a private web application to Cloudflare and protect it with Access.
8+
products:
9+
- cloudflare-one
10+
tags:
11+
- Private networks
12+
---
13+
14+
import { Render } from "~/components";
15+
16+
Connect a self-hosted web application to Cloudflare so authorized users can access it from a browser without a VPN. This is useful when you need to give employees or contractors secure access to applications like company intranets, internal wikis, or admin panels.
17+
18+
To explore other access scenarios, refer to [Secure private apps](/cloudflare-one/setup/secure-private-apps/).
19+
20+
This guide follows the same steps as the **Get Started** experience in the [Cloudflare One dashboard](https://one.dash.cloudflare.com).
21+
22+
## How it works
23+
24+
[Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/) connects your private network to Cloudflare without opening any ports on your network. You install `cloudflared`, a connector service that runs in the background, on a device that can reach your application. It creates a secure connection from your network out to Cloudflare, so no firewall changes are required.
25+
26+
[Cloudflare Access](/cloudflare-one/access-controls/) sits in front of the application and verifies who each user is before letting them through. Users sign in through a browser using an email one-time PIN or your identity provider.
27+
28+
## Prerequisites
29+
30+
- A Cloudflare account with a Zero Trust organization. If you have not set this up, refer to [Get started](/cloudflare-one/setup/).
31+
- An [active domain on your Cloudflare account](/fundamentals/manage-domains/add-site/). A public subdomain is created on this domain for your application.
32+
- A Linux, Windows, or macOS device on your private network that can reach the application. This is where you install the tunnel.
33+
- A running web application on your private network (for example, `http://10.10.1.25` or `http://grafana.local`).
34+
35+
## Step 1: Define your application
36+
37+
In this step, you describe the internal application you want to make available through Cloudflare.
38+
39+
1. In [Cloudflare One](https://one.dash.cloudflare.com), select the **Get Started** tab.
40+
2. For **Securely access private web apps without an agent**, select **Get started**.
41+
3. For **Connect a private web application**, select **Continue**.
42+
4. On the **Connect and access private web applications** screen, select **Continue**.
43+
5. Enter a name for your application (for example, `grafana-gcp`).
44+
6. Enter the hostname or IP address where the application is running. Use the IP address if you are not sure (for example, `10.10.1.25`).
45+
7. Select the protocol your application uses (HTTP or HTTPS).
46+
8. Enter the port your application listens on. This is usually part of the URL you use to access the application locally (for example, the `80` in `http://10.10.1.25:80`).
47+
9. Select **Continue**.
48+
49+
<Render
50+
file="access/secure-private-apps-shared-steps"
51+
product="cloudflare-one"
52+
/>
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
{}
3+
---
4+
5+
## Step 2: Select a public domain
6+
7+
Your application needs a public URL so users can reach it from a browser. Cloudflare creates a public URL on one of your existing domains for the application.
8+
9+
1. Select a domain from the dropdown.
10+
2. Enter a subdomain (for example, `grafana`). A preview of the full URL appears (for example, `grafana.example.com`).
11+
3. Select **Continue**.
12+
13+
## Step 3: Add your first policy
14+
15+
An Access policy controls who can reach your application. In this step, you create a simple policy using email-based one-time PINs. Users you add here receive a one-time PIN by email when they try to access the application.
16+
17+
1. Enter the email addresses of users you want to grant access to.
18+
2. Select **Continue**.
19+
20+
:::note
21+
You can add your identity provider (for example, Okta or Google Workspace) to the application later. For more information, refer to [Identity providers](/cloudflare-one/integrations/identity-providers/).
22+
:::
23+
24+
## Step 4: Assign a tunnel
25+
26+
A tunnel connects your private network to Cloudflare so traffic can reach your application. You can select an existing tunnel or create a new one.
27+
28+
1. In the **Choose or create a Tunnel** dropdown, select an existing tunnel or enter a name to create a new one.
29+
2. Select **Continue**.
30+
31+
## Step 5: Deploy your tunnel
32+
33+
Install `cloudflared` on a device in your private network that can reach the application. The dashboard generates commands specific to your operating system.
34+
35+
1. Select your operating system from the dropdown.
36+
2. Copy and run the commands shown in the dashboard. For Windows, open Command Prompt as an administrator. For all other operating systems, use a terminal window.
37+
3. After the tunnel connects, select **Continue**.
38+
39+
## Step 6: Review details
40+
41+
The dashboard confirms that your application is available and protected behind Cloudflare Access.
42+
43+
## Recommended next steps
44+
45+
- **Test your application**:
46+
1. Select **Test login** on the success screen.
47+
2. On the Access login screen, enter one of the email addresses you added to your Access policy.
48+
3. Select **Send me a code**.
49+
4. Enter the code from your email and select **Sign in**.
50+
51+
- **Explore more with Zero Trust**: Review your applications, policies, and tunnels in the [Cloudflare One dashboard](https://one.dash.cloudflare.com).
52+
- **Configure an identity provider**: Replace email one-time PINs with your organization's identity provider for a seamless login experience. For more information, refer to [Identity providers](/cloudflare-one/integrations/identity-providers/).
53+
54+
For in-depth guidance on clientless access, refer to the [Clientless access learning path](/learning-paths/clientless-access/concepts/what-is-clientless-access/).
55+
56+
## Troubleshoot
57+
58+
If you have issues connecting, refer to these resources:
59+
60+
- [Troubleshoot tunnels](/cloudflare-one/networks/connectors/cloudflare-tunnel/troubleshoot-tunnels/): diagnose tunnel connectivity and routing problems.
61+
- [Troubleshooting](/cloudflare-one/faq/troubleshooting/): resolve common Zero Trust errors and issues.

0 commit comments

Comments
 (0)