Skip to content

Commit 95aab12

Browse files
committed
Update step 4
1 parent 2a32c8a commit 95aab12

File tree

1 file changed

+15
-14
lines changed

1 file changed

+15
-14
lines changed

src/content/docs/cloudflare-one/tutorials/ai-wrapper-tenant-control.mdx

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -394,17 +394,18 @@ To secure the AI agent wrapper to ensure that only trusted users can access it:
394394

395395
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
396396
2. Select **Add an application**.
397-
3. Select **Self-hosted**.
398-
4. Enter any name for your AI Agent Wrapper application,.
399-
5. In Session Duration, choose how often the user's application token should expire.
400-
6. Select **Add public hostname** and enter the **custom domain** of your AI Agent Wrapper Worker.
401-
7. Add [Access policies](https://developers.cloudflare.com/cloudflare-one/policies/access/) to control who can connect to your application.
397+
3. Choose **Self-hosted**.
398+
4. Enter a name for your AI agent wrapper application.
399+
5. In **Session Duration**, choose when the user's application token should expire.
400+
6. Select **Add public hostname** and enter the custom domain you set for your Worker.
401+
7. [Configure your Access application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) for your Worker.
402+
8. Add [Access policies](/cloudflare-one/policies/access/policy-management/) to control who can connect to your application.
402403

403-
Now your AI Wrapper can only be accessed by clients that successfully match your Access policies. Consult our [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/self-hosted-public-app/#1-add-your-application-to-access) to know more.
404+
Now your AI wrapper can only be accessed by your users that successfully match your Access policies.
404405

405-
## Block access to public AI agents using Gateway
406+
## 5. Block access to public AI agents with Gateway
406407

407-
You can now block access to all unauthorized public AI agents by using the [**Secure Web Gateway[**(https://developers.cloudflare.com/cloudflare-one/policies/gateway/) to create a HTTP policy.
408+
You can now block access to all unauthorized public AI agents by using the [**Secure Web Gateway[**(/cloudflare-one/policies/gateway/) to create a HTTP policy.
408409

409410
If you use another gateway for web filtering, try to replicate a similar policy.
410411

@@ -419,15 +420,15 @@ If you use another gateway for web filtering, try to replicate a similar policy.
419420

420421
This ensures that public AI agents are not accessible using a managed endpoint.
421422

422-
User coaching is also possible, by displaying a [custom block message](https://developers.cloudflare.com/cloudflare-one/policies/gateway/block-page/) or a [user notification](https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
423+
User coaching is also possible, by displaying a [custom block message](/cloudflare-one/policies/gateway/block-page/) or a [user notification](/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
423424

424425
## Enforce DLP and agentless RBI
425426

426-
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/).
427+
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](/cloudflare-one/policies/browser-isolation/).
427428

428429
### Data Loss Prevention
429430

430-
[**Data Loss Prevention**](https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431+
[**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431432

432433
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
433434
2. Ensure that the DLP profiles you wish to enforce are properly configured.
@@ -469,12 +470,12 @@ Organizations that adopt Cloudflare to secure access to AI agents as exemplified
469470

470471
### Visibility
471472

472-
All [access events](https://developers.cloudflare.com/cloudflare-one/insights/logs/audit-logs/) to the AI wrapper and [DLP violations](https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs) will be logged in Cloudflare's dashboard. In addition, AI gateway provides [visibility](https://developers.cloudflare.com/ai-gateway/observability/logging/) into user prompts, model response, token usage and costs.
473+
All [access events](/cloudflare-one/insights/logs/audit-logs/) to the AI wrapper and [DLP violations](/cloudflare-one/insights/logs/gateway-logs/#http-logs) will be logged in Cloudflare's dashboard. In addition, AI gateway provides [visibility](/ai-gateway/observability/logging/) into user prompts, model response, token usage and costs.
473474

474-
Finally, all the logs can be easily exported to external systems using [Logpush](https://developers.cloudflare.com/logs/).
475+
Finally, all the logs can be easily exported to external systems using [Logpush](/logs/).
475476

476477
### Cost control and agility
477478

478-
The worker exemplified in this tutorial could be easily modified to use a [different AI provider](https://developers.cloudflare.com/ai-gateway/providers/) or give the user with the option to choose between multiple AI providers, including [AI models running directly on Cloudflare's global network](https://developers.cloudflare.com/workers-ai/).
479+
The worker exemplified in this tutorial could be easily modified to use a [different AI provider](/ai-gateway/providers/) or give the user with the option to choose between multiple AI providers, including [AI models running directly on Cloudflare's global network](/workers-ai/).
479480

480481
This enables organizations to better control costs related to AI usage and/or quickly adopt the latest innovations in the field without impacting the frontend users are accessing or the access controls already put in place.

0 commit comments

Comments
 (0)