You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`Chatgpt-Allowed-Workspace-Id`| Your organization's workspace ID |
97
+
98
+
For more information, refer to the [OpenAI documentation](https://help.openai.com/articles/8798594-what-is-a-workspace-how-do-i-access-my-chatgpt-business-workspace).
99
+
88
100
## Exempt users in Cloudflare WAF
89
101
90
102
You can include custom headers in an HTTP policy to allow your users through [Cloudflare WAF](/waf/). This is useful for allowing only WARP users through your WAF.
5. Under **Identity**, build a logical express that defines the user identity you want to capture and log their prompts to review for data loss prevention.
72
72
73
-
| Selector | Operator | API Value |
74
-
| -------- | -------- | ----- |
75
-
| Application | in |`any(identity.groups.name[*] in {\"contractors\" \"cohort-224\"})`|
| Application | in |`any(identity.groups.name[*] in {\"contractors\" \"cohort-224\"})`|
76
76
77
77
6. For **Action**, select **Allow**.
78
78
7. Select **Create policy**.
79
79
80
+
## Configure Gateway to use ChatGPT workspace header
81
+
82
+
If your organization uses [ChatGPT Business](https://chatgpt.com/business/), you can configure a Gateway policy to enforce the use of your organization's workspace ID, ensuring all traffic to ChatGPT is correctly associated with your account. This will implement Gateway [tenant control](/cloudflare-one/policies/gateway/http-policies/tenant-control/), which lets you manage how users interact with specific applications.
83
+
84
+
To create this policy, you will add a custom HTTP header to your Gateway policy. This header, `Chatgpt-Allowed-Workspace-Id`, ensures that only requests with your organization's unique workspace ID are permitted.
85
+
86
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall policies**.
87
+
2. In the **HTTP** tab, select **Add a policy**.
88
+
3. Name the policy.
89
+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow.
90
+
91
+
| Selector | Operator | Value |
92
+
| ----------- | -------- | --------- |
93
+
| Application | in |_ChatGPT_|
94
+
95
+
5. In **Action**, choose _Allow_.
96
+
6. In **Untrusted certificate action**, choose _Block_.
97
+
7. Under **Add headers to matched requests**, select **Add a header**.
-**Custom header value**: Your organization's workspace ID
101
+
9. Select **Create policy**.
102
+
103
+
For more information, refer to the [OpenAI documentation](https://help.openai.com/articles/8798594-what-is-a-workspace-how-do-i-access-my-chatgpt-business-workspace).
104
+
80
105
## Order your policies for specific inspection and enforcement
81
106
82
107
In most scenarios, Gateway evaluates HTTP policies in [top-down order](/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/).
@@ -86,27 +111,27 @@ For example, if you want to prevent sensitive data being shared with AI but want
86
111
87
112
1. The policy that blocks sensitive data being shared would need to be ordered first in this policy group. This will allow it to be enforced before the next policy in the policy group.
| User Group Names | in |`any(identity.groups.name[*] in {\"contractors\" \"cohort-224\"})`| Allow|
111
136
112
137
By structuring your policies in this way, you ensure that any instance of sensitive data is blocked from AI applications, no matter which user group is involved. If Cloudflare does not detect sensitive data, it will allow the prompt while capturing it for the targeted user groups – in this case, users belonging to the `contractors` and `cohort-224` groups. If that same user group were to then use sensitive data in a prompt, it would be detected and blocked.
0 commit comments