Skip to content

Commit b5ad0db

Browse files
committed
private app notifications
1 parent ac8e527 commit b5ad0db

File tree

2 files changed

+12
-2
lines changed

2 files changed

+12
-2
lines changed

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
1818

1919
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
2020
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
21-
- [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser and issue an authorization JWT to your origin. Otherwise, users will receive a pop-up notification from the WARP client and all session management will be handled in the WARP client.
2221

2322
## Add your application to Access
2423

@@ -71,6 +70,17 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
7170

7271
Users can now connect to your private application after authenticating with Cloudflare Access.
7372

73+
## Login page
74+
75+
### Browser notification
76+
77+
To prompt users to login in the browser, [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled. When the user connects to your private hostname or IP, Access will open your [login page](/cloudflare-one/applications/login-page/) and issue an authorization JWT to your origin.
78+
79+
### System notification
80+
If you do not turn on [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), users will receive a pop-up notification from the WARP client and all session management will be handled in the WARP client.
81+
82+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
83+
7484
## Modify order of precedence in Gateway
7585

7686
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):

src/content/partials/cloudflare-one/gateway/client-notifications.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ Turn on **Display block notification for WARP client** to display notifications
2525

2626
Upon selecting the notification, WARP will direct your users to a block page. Optionally, you can direct users to a custom URL, such as an internal support form.
2727

28-
<Render file="gateway/client-notifications-OS" product="cloudflare-one" />
28+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />

0 commit comments

Comments
 (0)