Skip to content

Commit e0e0ab4

Browse files
committed
migrate legacy policy
1 parent 557a0d5 commit e0e0ab4

File tree

4 files changed

+34
-58
lines changed

4 files changed

+34
-58
lines changed

src/content/docs/cloudflare-one/applications/non-http/private-network-app.mdx

Lines changed: 0 additions & 53 deletions
This file was deleted.

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ You can configure a self-hosted Access application to manage access to specific
3636
Private hostnames are currently only available over port `443` over HTTPS.
3737
:::
3838

39-
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application.
39+
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application. All Access applications are deny by default -- a user must match an Allow policy before they are granted access.
4040

4141
8. <Render file="access/access-choose-idps" product="cloudflare-one" />
4242

@@ -63,7 +63,7 @@ Users can now connect to your private application after authenticating with Clou
6363

6464
## Modify order of precedence in Gateway
6565

66-
By default, Cloudflare will evaluate Access private application policies after evaluating all Gateway network policies. To evaluate Access private application policies before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
66+
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
6767

6868

6969
| Selector | Operator | Value | Action |
@@ -73,5 +73,5 @@ By default, Cloudflare will evaluate Access private application policies after e
7373
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
7474

7575
:::note
76-
All Access applications are deny by default -- a user must match an associated Access Allow policy before they are granted access. The Gateway policy is strictly for routing and connectivity purposes.
76+
Users must pass the policies in your Access application before they are granted access. The Gateway policy is strictly for routing and connectivity purposes.
7777
:::

src/content/docs/cloudflare-one/policies/access/policy-management.mdx

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,9 @@ sidebar:
66

77
---
88

9-
Access policies are properties of applications. When setting up an Access application, you will be prompted to create at least one policy for the application. You can go back and create, edit, or delete policies at any time.
9+
import {Tabs, TabItem } from "~/components";
10+
11+
Access policies define the users who can log in to your Access applications. You can create, edit, or delete policies at any time and reuse them across multiple applications.
1012

1113
## Create a policy
1214

@@ -80,3 +82,30 @@ The policy tester reports the following information:
8082
* Whether the user is allowed or denied access to the application based on all configured policies.
8183
* The user's identity from their most recent Access login attempt.
8284
* Whether the user matches individual Allow, Block, or Bypass policies.
85+
86+
## Legacy policies
87+
88+
Legacy policies are scoped to a specific application and cannot be added to newly created Access applications.
89+
90+
### Migrate to reusable policies
91+
92+
To migrate legacy policies to reusable policies:
93+
94+
1. [Create a reusable policy](#create-a-policy) that will replace the legacy policy.
95+
2. Go to the application associated with the legacy policy.
96+
3. Add the reusable policy to the application and remove the legacy policy.
97+
4. Repeat these steps for each legacy policy. If you have duplicate legacy policies, you can replace them with a single reuseable policy.
98+
99+
### Convert a legacy policy
100+
101+
You can use the API to convert a legacy policy into a reusable policy. Once converted, you will only be able to manage the policy using the [reusable policies endpoints](/api/resources/zero_trust/subresources/access/subresources/policies/).
102+
103+
To convert a legacy policy, make a `PUT` request with an empty request body:
104+
105+
```bash
106+
curl --request PUT \
107+
https://api.cloudflare.com/client/v4/accounts/{account_id}/access/apps/{app_id}/policies/{legacy_policy_id}/make_reusable \
108+
--header "Authorization: Bearer <API_TOKEN>" \
109+
```
110+
111+
A success response returns the policy details. The policy is now removed from `/access/apps/{app_id}/policies` and available at `/access/policies/{policy_id}`.

src/content/partials/cloudflare-one/access/self-hosted-app.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ import { Render } from "~/components"
2323

2424
Alternatively, to use a [Cloudflare for SaaS custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/security/secure-with-access/), set **Input method** to _Custom_ and enter your custom hostname.
2525

26-
8. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application.
26+
8. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application. All Access applications are deny by default -- a user must match an Allow policy before they are granted access.
2727

2828
9. <Render file="access/access-choose-idps" product="cloudflare-one" />
2929

0 commit comments

Comments
 (0)