Skip to content

Commit d5d5fb3

Browse files
Suggestion: replacement of clientless access terminology
1 parent d338164 commit d5d5fb3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

src/content/docs/ssl/post-quantum-cryptography/pqc-and-zero-trust.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ The [Cloudflare Zero Trust platform](/cloudflare-one/) replaces legacy corporate
1010

1111
Refer to the sections below to learn about the use cases supported by the Zero Trust platform in this [first phase of quantum readiness](/ssl/post-quantum-cryptography/).
1212

13-
## Clientless Access
13+
## Cloudflare Access
1414

15-
[Clientless](/cloudflare-one/connections/connect-devices/agentless/) [Access](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) protects an organization's Internet traffic to internal web applications against quantum threats, even if the applications themselves have not yet migrated to post-quantum (PQ) cryptography.
15+
Without installing a dedicated client application on the end-user's device, you can use [Cloudflare Access](/cloudflare-one/policies/access/) [self-hosted applications](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to protect your organization's Internet traffic to internal web applications. Even if the applications themselves have not yet migrated to post-quantum (PQ) cryptography, they will be protected against quantum threats.
1616

17-
![Diagram of how post-quantum cryptography works with clientless Access](~/assets/images/ssl/pqc-clientless-access.png).
17+
![Diagram of how post-quantum cryptography works in clientless connections to Access applications](~/assets/images/ssl/pqc-clientless-access.png).
1818

1919
Here is how it works today:
2020

@@ -30,7 +30,7 @@ If the user and origin server are geographically distant, then the user's traffi
3030

3131
Customers establish a [Cloudflare Tunnel](/cloudflare-one/connections/connect-networks/) from their data center or public cloud — where their corporate web application is hosted — to Cloudflare's network. This tunnel is secured using TLS 1.3 with post-quantum key agreement, safeguarding it from harvest-now-decrypt-later attacks.
3232

33-
Putting it together, clientless Access provides end-to-end quantum safety for accessing corporate HTTPS applications, without requiring customers to upgrade the security of corporate web applications.
33+
Putting it together, Cloudflare Access can provide end-to-end quantum safety for accessing corporate HTTPS applications, without requiring customers to upgrade the security of corporate web applications.
3434

3535
## Secure Web Gateway
3636

0 commit comments

Comments
 (0)