Skip to content

Commit ac5baa7

Browse files
Update src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent ee9f19f commit ac5baa7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ Inside the policy, we’ve made this application available to our new access gro
458458

459459
[External evaluation](/cloudflare-one/policies/access/external-evaluation/) means we have an API endpoint containing some sort of [access logic](https://github.com/cloudflare/workers-access-external-auth-example) — in this case, time of day access. We’re making an API call to this endpoint, and defining the key that Cloudflare is using to verify that the response came from the API. This is useful for several reasons:
460460

461-
- External evaluation allows users to create bespoke security posture checks based on criteria that may not be covered by the default set of posture checks. For this example, wed be using a service built on [Cloudflare Workers](https://workers.cloudflare.com/).
461+
External evaluation allows users to create bespoke security posture checks based on criteria that may not be covered by the default set of posture checks. For this example, we'd be using a service built on [Cloudflare Workers](https://workers.cloudflare.com/).
462462
- Restricting access to the terminal outside of business hours implements a form of time-based access control. This adds an extra layer of security by limiting the window of opportunity for potential attackers.
463463

464464
Now, let’s look at how you’d secure RDP access as a private IP application.

0 commit comments

Comments
 (0)