Skip to content

Commit f15b813

Browse files
final edits from ann ming
1 parent 32d473e commit f15b813

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -193,34 +193,34 @@ SSH sessions have a maximum expected duration of 10 hours. For more information,
193193

194194
Failure to connect to your SSH endpoint could be the result of multiple variables. Use the following steps to investigate and resolve the source of your connection failure.
195195

196-
1. [Verify that your Access policies](#1-review-access-policies) allow the user to access the target machine.
196+
1. [Verify that your Access policies](#1-review-access-policies) allow the user to access the target.
197197
2. [Check Cloudflare Tunnel](#2-check-target-machine-connection) health.
198-
3. [Confirm user existence](#3-confirm-user-existence-on-the-target-server) on the target server.
198+
3. [Confirm user existence](#3-confirm-user-existence-on-the-target-server) on the server.
199199
4. [Check your `sshd_config` file](#4-debug-sshd_config-file-misconfiguration) for misconfiguration.
200200

201201
### 1. Review Access policies
202202

203-
A user may be blocked by an Access policy from reaching an SSH target because no explicit allow Access policy exists and Access is set to deny the user by default.
203+
A user may be blocked by an Access policy from reaching your server because no explicit allow Access policy exists and Access is set to deny the user by default.
204204

205205
:::note[Access policies and infrastructure applications]
206206

207-
The Access infrastructure application (created in [step 5](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application)) is the policy container for your SSH server. Cloudflare refers to your SSH server as a [target](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-add-a-target).
207+
The Access infrastructure application (created in [step 5](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application)) is the policy container for your SSH server. Cloudflare refers to your server that you connect to with SSH as a [target](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-add-a-target).
208208

209209
[Access policies](/cloudflare-one/policies/access/policy-management/) are the rules attached to this Access infrastructure application, determining who can connect and what UNIX usernames they can log in as on the server. Cloudflare will not create new users on the target. UNIX users must already be present on the server.
210210

211-
You were guided to create an Access policy for your SSH target in [substep 9 of step 5: Add an infrastructure application](#5-add-an-infrastructure-application).
211+
You were guided to create an Access policy for your target in [substep 9 of step 5: Add an infrastructure application](#5-add-an-infrastructure-application).
212212

213213
:::
214214

215215
#### End users
216216

217-
As an end user, run [`warp-cli target list`](/cloudflare-one/applications/non-http/infrastructure-apps/#display-available-targets) to verify that you have access to the target machine.
217+
As an end user, run [`warp-cli target list`](/cloudflare-one/applications/non-http/infrastructure-apps/#display-available-targets) to verify that you have access to the target.
218218

219219
<Render file="tunnel/warp-cli-target-list" product="cloudflare-one" />
220220

221-
- If the target appears in the list, confirm that the username you are attempting to connect with is shown in the output. If the username is not shown, an administrator must find the Access policy associated with the target machine and add that username to the Access policy. An administrator should have created an Access policy in [substep 9 of step 5: Add an infrastructure application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application). If the username is shown, that means the Access policy should be granting access and you should ensure that the tunnel is healthy in [step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection).
221+
- If the target appears in the list, confirm that the username you are attempting to connect with is shown in the output. If the username is not shown, an administrator must find the Access policy associated with the target and add that username to the Access policy. An administrator should have created an Access policy in [substep 9 of step 5: Add an infrastructure application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application). If the username is shown, that means the Access policy should be granting access and you should ensure that the tunnel is healthy in [step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection).
222222

223-
- If the target does not appear in the list, an administrator must audit the Access policies for the target machine in the Zero Trust dashboard for potential misconfiguration that may be blocking connection.
223+
- If the target does not appear in the list, an administrator must audit the Access policies for the target in the Zero Trust dashboard for potential misconfiguration that may be blocking connection.
224224

225225
#### Administrators
226226

@@ -238,7 +238,7 @@ You will need Cloudflare dashboard access and log view [permissions](/cloudflare
238238

239239
3. Review the **Decision**. If the **Decision** is `Access denied`, select the application and copy the name under App.
240240

241-
If the decision is `Access granted`, Access policies are not interfering with your connection attempts and your connection issue is due to the Cloudflare Tunnel, the target SSH machine, or the `sshd_config` file.
241+
If the decision is `Access granted`, Access policies are not interfering with your connection attempts and your connection issue is due to the Cloudflare Tunnel ([step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection)), the SSH server ([step 3](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#3-confirm-user-existence-on-the-target-server)), or the `sshd_config` file ([step 4](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-debug-sshd_config-file-misconfiguration)).
242242

243243
4. Go to **Access** > **Applications**.
244244

@@ -248,13 +248,13 @@ You will need Cloudflare dashboard access and log view [permissions](/cloudflare
248248

249249
7. Go to [**Policies**](/cloudflare-one/policies/access/policy-management/#test-your-policies) to review what criteria may be blocking the user.
250250

251-
By adding an Access [policy](/cloudflare-one/policies/access/) to allow the user, the connection issue should be resolved. After saving your policy changes, attempt to connect to the target machine as the end user.
251+
By adding an Access [policy](/cloudflare-one/policies/access/) to allow the user, the connection issue should be resolved. After saving your policy changes, attempt to connect to the server.
252252

253253
If you are still having connection issues after auditing your Access policies, review tunnel health in the following step.
254254

255-
### 2. Check target machine connection
255+
### 2. Check target connection
256256

257-
If the end user cannot connect to the target SSH machine, the tunnel you set up in [step 1: Connect the server to Cloudflare](#1-connect-the-server-to-cloudflare) may be down or inactive.
257+
If the end user cannot connect to the target, the tunnel you set up in [step 1: Connect the server to Cloudflare](#1-connect-the-server-to-cloudflare) may be down or inactive.
258258

259259
To check the status of your tunnel:
260260

@@ -276,13 +276,13 @@ To check the status of your tunnel:
276276

277277
For detailed steps on troubleshooting, refer to the [Troubleshooting Tunnel documentation](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/). Review the [Tunnel with Firewall documentation](/cloudflare-one/connections/connect-networks/configure-tunnels/tunnel-with-firewall/#test-connectivity) to ensure your network is correctly configured to allow `cloudflared` connections.
278278

279-
After you have verified that there are no issues with your tunnel's health, confirm the user's existence on the target SSH server in the following step.
279+
After you have verified that there are no issues with your tunnel's health, confirm the user's existence on the server in the following step.
280280

281-
### 3. Confirm user existence on the target server
281+
### 3. Confirm user existence on the server
282282

283-
To verify the existence of the end user on the target SSH server, run the `id <USERNAME>` command on the target SSH server to verify that the end user's username exists. If the username does not exist, you must add the user to the server.
283+
To verify the existence of the end user on the server, run the `id <USERNAME>` command on the server to verify that the end user's username exists. If the username does not exist, you must add the user to the server.
284284

285-
If the user exists on the target machine, debug your `sshd_config` file in the following step.
285+
If the user exists on the server, debug your `sshd_config` file in the following step.
286286

287287
### 4. Debug `sshd_config` file misconfiguration
288288

@@ -292,7 +292,7 @@ One reason a user is failing to connect to your SSH endpoint might be the result
292292

293293
`sshd` logs can confirm whether or not the user is making it to the server. The location of your `sshd` logs is defined in your `sshd_config`. The logs location is likely at `journalctl -u ssh` on Ubuntu and `tail /var/log/auth.log` for Red Hat.
294294

295-
Using your `sshd` logs, validate that SSH connection attempts are arriving to the SSH target machine.
295+
Using your `sshd` logs, validate that SSH connection attempts are arriving to the server.
296296

297297
#### Review your `sshd_config` file for misconfigurations
298298

@@ -441,7 +441,7 @@ Subsystem sftp /usr/lib/openssh/sftp-server
441441

442442
The next steps will walk you through a troubleshooting regimen. You will temporarily replace your existing `sshd_config` file with the provided example to rule out configuration issues. Before proceeding, carefully [review and compare both files](#review-your-sshd_config-file-for-misconfigurations) to identify any conflicting directives.
443443

444-
:::caution[You may lose access to your SSH server]
444+
:::caution[You may lose access to your server]
445445

446446
These troubleshooting steps could result in you being locked out of your SSH server because your current SSH session may rely on existing configuration that is not in the [example file](#review-your-sshd_config-file-for-misconfigurations). Proceed with utmost caution.
447447

0 commit comments

Comments
 (0)