Skip to content

Commit 7ef9ac3

Browse files
committed
update private network app
1 parent 3b94369 commit 7ef9ac3

File tree

2 files changed

+7
-11
lines changed

2 files changed

+7
-11
lines changed

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ You can configure a self-hosted Access application to manage access to specific
1616
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
1717
- [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser. Otherwise, users will receive a pop-up notification from the WARP client.
1818

19-
## 1. Add your application to Access
19+
## Add your application to Access
2020

2121
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
2222

@@ -48,7 +48,7 @@ You can configure a self-hosted Access application to manage access to specific
4848

4949
12. Select **Next**.
5050

51-
13. (Optional) Configure advanced settings for your application:
51+
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require Gateway TLS decryption.
5252

5353
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
5454
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
@@ -59,7 +59,9 @@ You can configure a self-hosted Access application to manage access to specific
5959

6060
14. Select **Save**.
6161

62-
## 2. (Optional) Modify order of precedence in Gateway
62+
Users can now connect to your private application after authenticating with Cloudflare Access.
63+
64+
## Modify order of precedence in Gateway
6365

6466
By default, Cloudflare will evaluate Access private application policies after evaluating all Gateway network policies. To evaluate Access private application policies before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
6567

@@ -72,10 +74,4 @@ You can now drag and drop this policy in the Gateway policy builder to change it
7274

7375
:::note
7476
All Access applications are deny by default -- a user must match an associated Access Allow policy before they are granted access. The Gateway policy is strictly for routing and connectivity purposes.
75-
:::
76-
77-
## 3. Validate the Access token
78-
79-
<Render file="access/secure-tunnel-with-access" />
80-
81-
Users can now connect to your private application after authenticating with Cloudflare Access.
77+
:::

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ Gateway matches network traffic against the following selectors, or criteria.
231231

232232
### All Access Private Apps
233233

234-
All destination IPs and hostnames associated with an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/#2-optional-modify-order-of-precedence-in-gateway).
234+
All destination IPs and hostnames associated with an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/#modify-order-of-precedence-in-gateway).
235235

236236
| UI name | API example |
237237
| ----------- | -------------------------- |

0 commit comments

Comments
 (0)