Skip to content

Commit af59246

Browse files
committed
Update details about tiered accounts
1 parent 4fbf99b commit af59246

File tree

2 files changed

+12
-9
lines changed

2 files changed

+12
-9
lines changed

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/managed-service-providers.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ Only available on Enterprise plans. For more information, contact your account t
1111

1212
Gateway supports the [Cloudflare Tenant API](/tenant/), which allows Cloudflare-partnered managed service providers (MSPs) to set up and manage Cloudflare accounts and services for their customers. With the Tenant API, MSPs can create Zero Trust deployments with global Gateway policy control. Policies can be customized or overridden at a group or individual account level.
1313

14-
The Tenant platform only supports [DNS policies](/cloudflare-one/policies/gateway/dns-policies/). For more information, refer to the [Cloudflare Zero Trust for managed service providers](https://blog.cloudflare.com/gateway-managed-service-provider/) blog post.
14+
The Tenant platform supports [DNS](/cloudflare-one/policies/gateway/dns-policies/), [network](/cloudflare-one/policies/gateway/network-policies/), [HTTP](/cloudflare-one/policies/gateway/http-policies/), and [resolver](/cloudflare-one/policies/gateway/resolver-policies/) policies. For more information, refer to the [Cloudflare Zero Trust for managed service providers](https://blog.cloudflare.com/gateway-managed-service-provider/) blog post.
1515

1616
## Get started
1717

1818
{/* Don't need to surface much of the policy creation flow here */}
1919

20-
To set up the Tenant API, refer to [Get started](/tenant/get-started/). Once you have provisioned and configured your customer's Cloudflare accounts, you can create [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
20+
To set up the Tenant API, refer to [Get started](/tenant/get-started/). Once you have provisioned and configured your customer's Cloudflare accounts, you can create [Gateway policies](/cloudflare-one/policies/gateway/).
2121

2222
## Account types
2323

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/organizational-policies.mdx

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,24 +17,24 @@ Gateway supports using [Cloudflare Organizations](/fundamentals/organizations/)
1717

1818
{/* Don't need to surface much of the policy creation flow here */}
1919

20-
To set up CLoudflare Organizations, refer to [Create an Organization](/fundamentals/organizations/#create-an-organization). Once you have provisioned and configured your organization's accounts, you can create [Gateway policies](/cloudflare-one/policies/gateway/).
20+
To set up Cloudflare Organizations, refer to [Create an Organization](/fundamentals/organizations/#create-an-organization). Once you have provisioned and configured your organization's accounts, you can create [Gateway policies](/cloudflare-one/policies/gateway/).
2121

2222
## Account types
2323

2424
The Gateway Tenant platform supports tiered and siloed account configurations.
2525

2626
### Tiered accounts
2727

28-
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can override or add policies as needed while still being managed by the parent account. MSPs can also configure child accounts independently from the parent account, including:
28+
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can add policies as needed while still being managed by the parent account. Organization owners can also configure child accounts independently from the parent account, including:
2929

3030
- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/)
3131
- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/)
3232
- Mapping [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/)
3333
- Creating [lists](/cloudflare-one/policies/gateway/lists/)
3434

35-
Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
35+
Gateway will automatically [generate a unique root CA](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) for each child account in an organization. Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
3636

37-
Gateway evaluates parent account policies before any child account policies. To allow a child account to override a specific parent account policy, you can use the [Update a Zero Trust Gateway rule](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/update/) endpoint to set the policy's `allow_child_bypass` rule setting to `true`.
37+
Gateway evaluates parent account policies before any child account policies. In a Cloudflare Organization, child accounts cannot bypass parent account policies. All traffic and corresponding policies, logs, and configurations for a child account will be contained to that child account. Organization owners can view logs for child accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
3838

3939
```mermaid
4040
flowchart TD
@@ -56,7 +56,6 @@ flowchart TD
5656
end
5757
n1 ~~~ n2
5858
n2 ~~~ n3
59-
A["Tenant"] --Administers--> s1
6059
s1 -- "Applies policies to" --> s2 & s3
6160
6261
n1@{ shape: lean-l}
@@ -66,9 +65,13 @@ flowchart TD
6665
n5@{ shape: lean-l}
6766
```
6867

68+
:::caution[Limitations]
69+
Organizational policies do not support egress policies, device posture selectors, private apps, or virtual networks.
70+
:::
71+
6972
### Siloed accounts
7073

71-
In a siloed account configuration, each account operates independently within the same tenant. MSPs manage each account's own security policies, resources, and configurations separately.
74+
In a siloed account configuration, each account operates independently within the same tenant. Organization owners manage each account's own security policies, resources, and configurations separately.
7275

7376
```mermaid
7477
flowchart TD
@@ -86,7 +89,7 @@ flowchart TD
8689
subgraph s3["Siloed account B"]
8790
n3["Block news"]
8891
end
89-
A["Tenant"] -- Administers --> s1 & s3 & s2
92+
A["Organization owner"] -- Administers --> s1 & s3 & s2
9093
9194
n1@{ shape: lean-l}
9295
n2@{ shape: lean-l}

0 commit comments

Comments
 (0)