Skip to content

Commit 872a4ae

Browse files
committed
turn off WARP auth for RDP
1 parent 887086e commit 872a4ae

File tree

2 files changed

+20
-6
lines changed

2 files changed

+20
-6
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,7 @@ Ensure that only **Allow** or **Block** policies are present. **Bypass** and **S
123123
19. Select **Save**.
124124

125125
## 5. (Recommended) Modify order of precedence in Gateway
126+
126127
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target", protocol: "rdp" }} />
127128

128129
## 6. Connect as a user
@@ -216,7 +217,7 @@ Cloudflare will not configure user identifiers on the RDP target. Any user ident
216217
## Known limitations
217218

218219
- **TLS certificate verification**: Cloudflare uses TLS to connect to the RDP target but does not verify the origin TLS certificate.
219-
- **WARP authentication**: Users cannot authenticate to RDP targets using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/#configure-warp-sessions-in-access).
220+
- **WARP authentication**: Since browser-based RDP traffic does not go through the WARP client, users cannot use their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/#configure-warp-sessions-in-access) to authenticate.
220221
- **Audio over RDP**: Users cannot use their microphone and speaker to interact with the remote machine.
221222
- **Clipboard controls**: Admins do not have the ability to restrict copy/paste actions between the remote machine and the user's local clipboard.
222223
- **File transfers**: Users cannot copy/paste files from their local machine to the remote machine and vice versa.

src/content/partials/cloudflare-one/access/modify-gateway-policy-precedence.mdx

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,26 @@ params:
44
- protocol
55
---
66

7-
By default, Cloudflare will evaluate Access application policies after evaluating all Gateway network policies. To evaluate Access applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
7+
By default, Cloudflare will evaluate Access application policies after evaluating all Gateway network policies. To evaluate Access applications before or after specific Gateway policies:
88

9-
| Selector | Operator | Value | Action |
10-
| ---------------------------- | -------- | --------- | ------ |
11-
| {props.selector} | is | _Present_ | Allow |
9+
<ol>
10+
<li>
11+
Create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
12+
13+
| Selector | Operator | Value | Action |
14+
| ---------------------------- | -------- | --------- | ------ |
15+
| {props.selector} | is | _Present_ | Allow |
16+
</li>
17+
18+
{ props.protocol === "rdp" && (<> <li> Ensure that <strong>Enforce WARP client session duration</strong> is turned off, otherwise users will be blocked from accessing RDP targets. </li> </>)}
19+
20+
<li>
21+
Update the policy's [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence) using the dashboard or API.
22+
</li>
23+
24+
</ol>
25+
This Gateway policy will apply to all Access for Infrastructure targets, including RDP and SSH.
1226

13-
{ props.protocol === "rdp" && (<> Make sure that <strong>Enforce WARP client session duration</strong> is turned off, since RDP targets do not support WARP authentication. </>)} You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
1427

1528
:::note
1629
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.

0 commit comments

Comments
 (0)