You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/tutorials/ai-wrapper-tenant-control.mdx
+15-14Lines changed: 15 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -394,17 +394,18 @@ To secure the AI agent wrapper to ensure that only trusted users can access it:
394
394
395
395
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
396
396
2. Select **Add an application**.
397
-
3. Select **Self-hosted**.
398
-
4. Enter any name for your AI Agent Wrapper application,.
399
-
5. In Session Duration, choose how often the user's application token should expire.
400
-
6. Select **Add public hostname** and enter the **custom domain** of your AI Agent Wrapper Worker.
401
-
7. Add [Access policies](https://developers.cloudflare.com/cloudflare-one/policies/access/) to control who can connect to your application.
397
+
3. Choose **Self-hosted**.
398
+
4. Enter a name for your AI agent wrapper application.
399
+
5. In **Session Duration**, choose when the user's application token should expire.
400
+
6. Select **Add public hostname** and enter the custom domain you set for your Worker.
401
+
7.[Configure your Access application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) for your Worker.
402
+
8. Add [Access policies](/cloudflare-one/policies/access/policy-management/) to control who can connect to your application.
402
403
403
-
Now your AI Wrapper can only be accessed by clients that successfully match your Access policies. Consult our [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/self-hosted-public-app/#1-add-your-application-to-access) to know more.
404
+
Now your AI wrapper can only be accessed by your users that successfully match your Access policies.
404
405
405
-
## Block access to public AI agents using Gateway
406
+
## 5. Block access to public AI agents with Gateway
406
407
407
-
You can now block access to all unauthorized public AI agents by using the [**Secure Web Gateway[**(https://developers.cloudflare.com/cloudflare-one/policies/gateway/) to create a HTTP policy.
408
+
You can now block access to all unauthorized public AI agents by using the [**Secure Web Gateway[**(/cloudflare-one/policies/gateway/) to create a HTTP policy.
408
409
409
410
If you use another gateway for web filtering, try to replicate a similar policy.
410
411
@@ -419,15 +420,15 @@ If you use another gateway for web filtering, try to replicate a similar policy.
419
420
420
421
This ensures that public AI agents are not accessible using a managed endpoint.
421
422
422
-
User coaching is also possible, by displaying a [custom block message](https://developers.cloudflare.com/cloudflare-one/policies/gateway/block-page/) or a [user notification](https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
423
+
User coaching is also possible, by displaying a [custom block message](/cloudflare-one/policies/gateway/block-page/) or a [user notification](/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
423
424
424
425
## Enforce DLP and agentless RBI
425
426
426
-
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/).
427
+
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](/cloudflare-one/policies/browser-isolation/).
427
428
428
429
### Data Loss Prevention
429
430
430
-
[**Data Loss Prevention**](https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431
+
[**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431
432
432
433
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
433
434
2. Ensure that the DLP profiles you wish to enforce are properly configured.
@@ -469,12 +470,12 @@ Organizations that adopt Cloudflare to secure access to AI agents as exemplified
469
470
470
471
### Visibility
471
472
472
-
All [access events](https://developers.cloudflare.com/cloudflare-one/insights/logs/audit-logs/) to the AI wrapper and [DLP violations](https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs) will be logged in Cloudflare's dashboard. In addition, AI gateway provides [visibility](https://developers.cloudflare.com/ai-gateway/observability/logging/) into user prompts, model response, token usage and costs.
473
+
All [access events](/cloudflare-one/insights/logs/audit-logs/) to the AI wrapper and [DLP violations](/cloudflare-one/insights/logs/gateway-logs/#http-logs) will be logged in Cloudflare's dashboard. In addition, AI gateway provides [visibility](/ai-gateway/observability/logging/) into user prompts, model response, token usage and costs.
473
474
474
-
Finally, all the logs can be easily exported to external systems using [Logpush](https://developers.cloudflare.com/logs/).
475
+
Finally, all the logs can be easily exported to external systems using [Logpush](/logs/).
475
476
476
477
### Cost control and agility
477
478
478
-
The worker exemplified in this tutorial could be easily modified to use a [different AI provider](https://developers.cloudflare.com/ai-gateway/providers/) or give the user with the option to choose between multiple AI providers, including [AI models running directly on Cloudflare's global network](https://developers.cloudflare.com/workers-ai/).
479
+
The worker exemplified in this tutorial could be easily modified to use a [different AI provider](/ai-gateway/providers/) or give the user with the option to choose between multiple AI providers, including [AI models running directly on Cloudflare's global network](/workers-ai/).
479
480
480
481
This enables organizations to better control costs related to AI usage and/or quickly adopt the latest innovations in the field without impacting the frontend users are accessing or the access controls already put in place.
0 commit comments