Skip to content

Commit 91ecba3

Browse files
Michael9127maxvpranbel
authored
ZTIA-507: Update docs to match new Gateway selectors for Access infra… (#19950)
* ZTIA-507: Update docs to match new Gateway selectors for Access infra apps * Fix Gateway policy formatting * Fix tables * Add partials * Add selectors to HTTP policies * Remove diff fluff * Update src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx * Update src/content/partials/cloudflare-one/gateway/selectors/all-access-app-targets.mdx * Update src/content/partials/cloudflare-one/gateway/selectors/all-access-private-app-destinations.mdx * Apply suggestions from code review update selector descriptions --------- Co-authored-by: Michael Borkenstein <[email protected]> Co-authored-by: Max Phillips <[email protected]> Co-authored-by: ranbel <[email protected]>
1 parent 340c840 commit 91ecba3

File tree

6 files changed

+50
-12
lines changed

6 files changed

+50
-12
lines changed

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,3 +122,17 @@ The following [Access policy selectors](/cloudflare-one/policies/access/#selecto
122122
- Authentication method
123123
- Device posture
124124
- Entra group, GitHub organization, Google Workspace group, Okta group
125+
126+
## Modify order of precedence in Gateway
127+
128+
By default, Cloudflare will evaluate Access infrastructure application policies after evaluating all Gateway network policies. To evaluate Access infrastructure applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
129+
130+
| Selector | Operator | Value | Action |
131+
| ---------------------- | -------- | ----- | ------ |
132+
| All Access App Targets | is | on | Allow |
133+
134+
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
135+
136+
:::note
137+
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.
138+
:::

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Add a self-hosted private application
77
---
88

9-
import { Render } from "~/components"
9+
import { Render } from "~/components";
1010

1111
You can configure a self-hosted Access application to manage access to specific IPs or hostnames on your private network.
1212

@@ -75,12 +75,11 @@ Users can now connect to your private application after authenticating with Clou
7575

7676
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
7777

78+
| Selector | Operator | Value | Action |
79+
| ----------------------------------- | -------- | ----- | ------ |
80+
| All Access App Private Destinations | is | on | Allow |
7881

79-
| Selector | Operator | Value | Action |
80-
| -------- | -------- | ------------ | ------ |
81-
| All Access Private Apps | is | `Enabled` | Allow |
82-
83-
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
82+
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
8483

8584
:::note
8685
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -397,14 +397,20 @@ Policies created using the URL selector are case-sensitive.
397397

398398
Gateway matches HTTP traffic against the following selectors, or criteria:
399399

400+
### All Access Private App Destinations
401+
402+
<Render file="gateway/selectors/all-access-private-app-destinations" />
403+
404+
### All Access App Targets
405+
406+
<Render file="gateway/selectors/all-access-app-targets" />
407+
400408
### Application
401409

402410
<Render file="gateway/selectors/application" params={{ one: "HTTP" }} />
403411

404412
:::caution[Multiple API selectors required for Terraform]
405-
406413
When using Terraform to create a policy with the [Do Not Inspect](#do-not-inspect) action, you must use the `app.hosts_ids` and `app.supports_ids` selectors. For example, to create a Do Not Inspect policy for Google Cloud Platform traffic, create a policy with both `any(app.hosts_ids[*] in {1245})` and `any(app.supports_ids[*] in {1245})`.
407-
408414
:::
409415

410416
### Content Categories

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ API value: `allow`
3939
**Traffic**
4040

4141
- [All Access Private Apps](#all-access-private-apps)
42+
- [All Access App Targets](#all-access-app-targets)
4243
- [Application](#application)
4344
- [Content Categories](#content-categories)
4445
- [Destination Continent IP Geolocation](#destination-continent)
@@ -231,11 +232,11 @@ Gateway matches network traffic against the following selectors, or criteria.
231232

232233
### All Access Private App Destinations
233234

234-
All destination IPs and hostnames associated with an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/#modify-order-of-precedence-in-gateway).
235+
<Render file="gateway/selectors/all-access-private-app-destinations" />
235236

236-
| UI name | API example |
237-
| ----------- | -------------------------- |
238-
| All Access Private App Destinations | `access.private_app` |
237+
### All Access App Targets
238+
239+
<Render file="gateway/selectors/all-access-app-targets" />
239240

240241
### Application
241242

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
{}
3+
---
4+
5+
All [targets](/cloudflare-one/applications/non-http/infrastructure-apps/#1-add-a-target) secured by an [Access infrastructure application](/cloudflare-one/applications/non-http/infrastructure-apps/).
6+
7+
| UI name | API example |
8+
| ---------------------- | --------------- |
9+
| All Access App Targets | `access.target` |
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
{}
3+
---
4+
5+
All destination IPs and hostnames secured by an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/).
6+
7+
| UI name | API example |
8+
| ----------------------------------- | -------------------- |
9+
| All Access Private App Destinations | `access.private_app` |

0 commit comments

Comments
 (0)