Skip to content

Commit b0b16b9

Browse files
committed
Re-add index
1 parent af59246 commit b0b16b9

File tree

3 files changed

+89
-103
lines changed

3 files changed

+89
-103
lines changed

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/index.mdx

Lines changed: 88 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,95 @@ pcx_content_type: navigation
33
title: Tiered policies
44
sidebar:
55
order: 15
6-
group:
7-
hideIndex: true
86
---
97

10-
import { DirectoryListing } from "~/components";
8+
:::note
9+
Only available on Enterprise plans. For more information, contact your account team.
10+
:::
1111

12-
Zero Trust supports two types of Gateway tiered policy configurations:
12+
{/* TODO: Update the Orgs link with most up to date option */}
1313

14-
<DirectoryListing />
14+
Gateway supports using [Cloudflare Organizations](/fundamentals/organizations/) to share configurations between and apply specific policies to accounts within an organization. Tiered organizational policies support [DNS](/cloudflare-one/policies/gateway/dns-policies/), [network](/cloudflare-one/policies/gateway/network-policies/), [HTTP](/cloudflare-one/policies/gateway/http-policies/), and [resolver](/cloudflare-one/policies/gateway/resolver-policies/) policies.
15+
16+
## Get started
17+
18+
{/* Don't need to surface much of the policy creation flow here */}
19+
20+
To set up Cloudflare Organizations, refer to [Create an Organization](/fundamentals/organizations/#create-an-organization). Once you have provisioned and configured your organization's accounts, you can create [Gateway policies](/cloudflare-one/policies/gateway/).
21+
22+
## Account types
23+
24+
The Gateway Tenant platform supports tiered and siloed account configurations.
25+
26+
### Tiered accounts
27+
28+
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can add policies as needed while still being managed by the parent account. Organization owners can also configure child accounts independently from the parent account, including:
29+
30+
- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/)
31+
- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/)
32+
- Mapping [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/)
33+
- Creating [lists](/cloudflare-one/policies/gateway/lists/)
34+
35+
Gateway will automatically [generate a unique root CA](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) for each child account in an organization. Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
36+
37+
Gateway evaluates parent account policies before any child account policies. In a Cloudflare Organization, child accounts cannot bypass parent account policies. All traffic and corresponding policies, logs, and configurations for a child account will be contained to that child account. Organization owners can view logs for child accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
38+
39+
```mermaid
40+
flowchart TD
41+
%% Accessibility
42+
accTitle: How Gateway policies work in a tiered account configuration
43+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration.
44+
45+
%% Flowchart
46+
subgraph s1["Parent account"]
47+
n1["Block malware"]
48+
n2["Block DNS tunnel"]
49+
n3["Block spyware"]
50+
end
51+
subgraph s2["Child account A"]
52+
n4["Block social media"]
53+
end
54+
subgraph s3["Child account B"]
55+
n5["Block instant messaging"]
56+
end
57+
n1 ~~~ n2
58+
n2 ~~~ n3
59+
s1 -- "Applies policies to" --> s2 & s3
60+
61+
n1@{ shape: lean-l}
62+
n2@{ shape: lean-l}
63+
n3@{ shape: lean-l}
64+
n4@{ shape: lean-l}
65+
n5@{ shape: lean-l}
66+
```
67+
68+
:::caution[Limitations]
69+
Tiered policies do not support egress policies, device posture selectors, private apps, or virtual networks.
70+
:::
71+
72+
### Siloed accounts
73+
74+
In a siloed account configuration, each account operates independently within the same tenant. Organization owners manage each account's own security policies, resources, and configurations separately.
75+
76+
```mermaid
77+
flowchart TD
78+
%% Accessibility
79+
accTitle: How Gateway policies work in a siloed account configuration
80+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a siloed account configuration.
81+
82+
%% Flowchart
83+
subgraph s1["Siloed account A"]
84+
n1["Block social media"]
85+
end
86+
subgraph s2["Siloed account C"]
87+
n2["Block instant messaing"]
88+
end
89+
subgraph s3["Siloed account B"]
90+
n3["Block news"]
91+
end
92+
A["Organization owner"] -- Administers --> s1 & s3 & s2
93+
94+
n1@{ shape: lean-l}
95+
n2@{ shape: lean-l}
96+
n3@{ shape: lean-l}
97+
```

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/managed-service-providers.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: get-started
33
title: Managed service providers (MSPs)
44
sidebar:
5-
order: 3
5+
order: 2
66
---
77

88
:::note

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/organizational-policies.mdx

Lines changed: 0 additions & 97 deletions
This file was deleted.

0 commit comments

Comments
 (0)