Skip to content

Commit d3f7e02

Browse files
committed
Apply style guide
1 parent bfa4fe1 commit d3f7e02

File tree

1 file changed

+17
-6
lines changed

1 file changed

+17
-6
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/tenant-control.mdx

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ With Gateway tenant control, you can allow your users access to corporate SaaS a
99

1010
When creating an HTTP policy with an Allow action, you will have the option to configure custom headers. Gateway can use custom headers to control SaaS application access. If a user's HTTP request is headed to your organization's account for the SaaS application, Gateway will approve the request. If the request does not match the information in the header, Gateway will block the request.
1111

12-
## Note
13-
14-
Customer headers will not appear in a HAR file taken from your browser. This is due to the header being injected by Gateway after the request leaves your browser. To verify if a custom header is being applied, temporarily add a selector for *Domain > In > httpbin.org* to your Gateway rule, once saved go to [`httpbin.org/anything`](https://httpbin.org/anything) and verify the custom header is shown.
15-
1612
## Add custom headers for a SaaS application
1713

1814
To create an HTTP policy with custom headers:
@@ -27,6 +23,22 @@ To create an HTTP policy with custom headers:
2723

2824
Your policy is now displayed in your list of HTTP policies. When your users attempt to authenticate your configured SaaS application with a personal account, authentication will fail.
2925

26+
### Verify custom headers
27+
28+
If you save a HAR (HTTP Archive) file from a browser to analyze your web traffic, custom headers defined with Gateway will not appear in the file. This is because Gateway injects the header after the request leaves the browser.
29+
30+
To verify Gateway is applying a custom header:
31+
32+
1. In your policy with custom headers, add a selector to match traffic for [HTTPBin](https://httpbin.org/), an open-source site for testing HTTP requests. For example:
33+
34+
| Selector | Operator | Value | Logic | Action | Untrusted certificate action |
35+
| ----------- | -------- | ------------------ | ----- | ------ | ---------------------------- |
36+
| Application | in | _Google Workspace_ | And | Allow | Block |
37+
| Domain | in | `httpbin.org` | | | |
38+
39+
2. On your device, go to [`httpbin.org/anything`](https://httpbin.org/anything). Your custom header will appear in the list of headers.
40+
3. (Optional) Remove the HTTPBin expression from your policy.
41+
3042
## Common policy configurations
3143

3244
Depending on which SaaS application your organization needs access to, different tenant control policies are required.
@@ -121,7 +133,7 @@ You can include custom headers in an HTTP policy to allow your users through [Cl
121133

122134
You can configure [Browser Isolation](/cloudflare-one/policies/browser-isolation/) to send custom headers. This is useful for implementing tenant control for isolated SaaS applications or sending arbitrary custom request headers to isolated websites.
123135

124-
To use custom headers with Browser Isolation, create two HTTP policies targeting the same domain or application group. For example, you can create policies for [httpbin](https://httpbin.org/), an open-source site for testing HTTP requests:
136+
To use custom headers with Browser Isolation, create two HTTP policies targeting the same domain or application group. For example, you can create policies for [HTTPBin](https://httpbin.org/), an open-source site for testing HTTP requests:
125137

126138
1. Create an Isolate policy for `httpbin.org`.
127139

@@ -140,4 +152,3 @@ To use custom headers with Browser Isolation, create two HTTP policies targeting
140152
| `Example-Header` | `example-value` |
141153

142154
3. Go to [`httpbin.org/anything`](https://httpbin.org/anything). Cloudflare will render the site in an isolated browser. Your custom header will appear in the list of headers.
143-

0 commit comments

Comments
 (0)