You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/gateway/http-policies/granular-controls.mdx
+23-15Lines changed: 23 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,27 +7,35 @@ sidebar:
7
7
8
8
import { Details } from"~/components";
9
9
10
-
Application Granular Controls allows you to create Gateway HTTP policies to control specific user actions within supported SaaS applications. This allows you to give users access to an application while restricting the actions that they can take within the application.
10
+
Application Granular Controls allows you to create [Gateway HTTP policies](/cloudflare-one/policies/gateway/http-policies/) to control specific user actions within supported SaaS applications. This allows you to give users access to an application while restricting the actions that they can take within the application.
11
11
12
-
:::note
13
-
To enable HTTPS inspection, which is required for this feature, you must have [TLS decryption enabled](/learning-paths/replace-vpn/configure-device-agent/enable-tls-decryption/) in your account settings.
14
-
:::
12
+
## Prerequisites
15
13
16
-
## Create a Gateway policy with Application Granular Controls
14
+
To use Application Granular Controls, you must:
17
15
18
-
To create an HTTP policy with Application Granular Controls:
16
+
- Install a [Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) or a [custom certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/custom-certificate/) on your users' devices.
17
+
- Turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
18
+
19
+
## Create a policy with Application Granular Controls
20
+
21
+
{/* TODO: Add API and Terraform instructions */}
22
+
23
+
To create a Gateway HTTP policy with Application Granular Controls:
19
24
20
25
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**. Select **HTTP**.
21
26
2. Select **Add a policy**.
22
-
3. Give your policy a name (for example, "Block Google Drive Uploads”) and a description.
23
-
4. In the expression builder, define the scope of your policy. In the **Traffic** section, add a condition and specify the **Application** selector.
24
-
5. Select the “is” **Operator** (application granular controls are specific to an application so the condition must reference a single application using the is operator).
25
-
6. In the **Value** field, the applications that support granular controls are grouped in the categories at the top of the list for example “File Sharing (with Granular Controls)”. Select the required application (for example Google Drive).
26
-
7. A fourth **Controls** field will appear, allowing you to select one or more **Application Controls** or individual **Operations** (see below for an explanation of these terms).
27
-
8. Complete your policy expression with any other conditions, select an **Action** and configure any desired policy settings.
28
-
9. Select **Create policy** to save and activate your policy.
29
-
30
-
The policy will appear in the list of HTTP policies. Here, the [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence) can be changed and the policy can be disabled or enabled.
27
+
3. Name the policy.
28
+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block. To use Application Granular Controls, you must use the _Application_ selector with the _is_ operator.
29
+
5. In **Value**, select your desired application.
30
+
6. In **Controls**, choose one or more Application Controls or individual Operations. For example, you can create a policy to block file uploads to ChatGPT:
0 commit comments