Skip to content

Commit f3cdd33

Browse files
Michael9127ranbel
andauthored
PCX-17471: adds gateway policy precedence modification instructions to Access app docs more prominently (#22482)
* PCX-17471: adds gateway policy precedence modification instructions to Access app docs more prominently * Update modify-gateway-policy-precedence.mdx * Update modify-gateway-policy-precedence.mdx add param * Apply suggestions from code review --------- Co-authored-by: ranbel <[email protected]>
1 parent 58152ff commit f3cdd33

File tree

6 files changed

+33
-35
lines changed

6 files changed

+33
-35
lines changed

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 5 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,16 @@ Access for Infrastructure currently only supports [SSH](/cloudflare-one/connecti
4343

4444
<Render file="access/add-infrastructure-app" />
4545

46-
## 3. Configure the server
46+
## 3. (Recommended) Modify order of precedence in Gateway
47+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
48+
49+
## 4. Configure the server
4750

4851
Certain protocols require configuring the server to trust connections through Access for Infrastructure. For more information, refer to the protocol-specific tutorial:
4952

5053
- [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#6-configure-ssh-server)
5154

52-
## 4. Connect as a user
55+
## 5. Connect as a user
5356

5457
Users connect to the target's IP address using their preferred client software. The user must be logged into WARP on their device, but no other system configuration is required. You can optionally configure a [private DNS resolver](/cloudflare-one/policies/gateway/resolver-policies/) to allow connections to the target's private hostname.
5558

@@ -117,17 +120,3 @@ The following [Access policy selectors](/cloudflare-one/policies/access/#selecto
117120
- Authentication method
118121
- Device posture
119122
- Entra group, GitHub organization, Google Workspace group, Okta group
120-
121-
## Modify order of precedence in Gateway
122-
123-
By default, Cloudflare will evaluate Access infrastructure application policies after evaluating all Gateway network policies. To evaluate Access infrastructure applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
124-
125-
| Selector | Operator | Value | Action |
126-
| ---------------------------- | -------- | --------- | ------ |
127-
| Access Infrastructure Target | is | _Present_ | Allow |
128-
129-
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
130-
131-
:::note
132-
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.
133-
:::

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -76,15 +76,4 @@ The WARP client manages sessions for all non-HTTPS applications. Users will rece
7676
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
7777

7878
## Modify order of precedence in Gateway
79-
80-
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
81-
82-
| Selector | Operator | Value | Action |
83-
| ------------------ | -------- | --------- | ------ |
84-
| Access Private App | is | _Present_ | Allow |
85-
86-
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
87-
88-
:::note
89-
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.
90-
:::
79+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Private App" }} />

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,10 @@ If you do not already have a DNS record, [create a new DNS record](/dns/manage-d
9797
- **IPv6 address**: `100::`
9898
- **Proxy status**: On
9999

100-
## 5. Connect as a user
100+
## 5. (Recommended) Modify order of precedence in Gateway
101+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
102+
103+
## 6. Connect as a user
101104

102105
To connect to a Windows machine over RDP:
103106

src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,10 @@ To connect your devices to Cloudflare:
4141

4242
<Render file="access/add-infrastructure-app" />
4343

44-
## 6. Configure SSH server
44+
## 6. (Recommended) Modify order of precedence in Gateway
45+
<Render file="access/modify-gateway-policy-precedence" product="cloudflare-one" params={{ selector: "Access Infrastructure Target" }} />
46+
47+
## 7. Configure SSH server
4548

4649
Next, configure your SSH server to trust the Cloudflare SSH CA. This allows Access to authenticate using short-lived certificates instead of traditional SSH keys.
4750

@@ -74,7 +77,7 @@ chmod 600 /etc/ssh/ca.pub
7477

7578
<Render file="ssh/restart-server" />
7679

77-
## 7. Connect as a user
80+
## 8. Connect as a user
7881

7982
Users can use any SSH client to connect to the target, as long as they are logged into the WARP client on their device. If the target is located within a particular virtual network, ensure that the WARP client is [connected to that virtual network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/#connect-to-a-virtual-network) before initiating the connection. Users do not need to modify any SSH configs on their device. For example, to SSH from a terminal:
8083

src/content/partials/cloudflare-one/access/add-infrastructure-app.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,3 @@ The following example requires Cloudflare provider version `>=4.45.0`.
135135
</Tabs>
136136

137137
The targets in this application are now secured by your infrastructure policies.
138-
139-
:::note
140-
Gateway [network policies](/cloudflare-one/policies/gateway/network-policies/) take precedence over infrastructure policies. For example, if you block port `22` for all users in Gateway, then no one can SSH over port `22` to your targets.
141-
:::
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
params:
3+
- selector
4+
5+
---
6+
7+
By default, Cloudflare will evaluate Access application policies after evaluating all Gateway network policies. To evaluate Access applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
8+
9+
| Selector | Operator | Value | Action |
10+
| ---------------------------- | -------- | --------- | ------ |
11+
| {props.selector} | is | _Present_ | Allow |
12+
13+
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
14+
15+
:::note
16+
Users must pass the policies in your Access application before they are granted access. The Gateway Allow policy is strictly for routing and connectivity purposes.
17+
:::
18+

0 commit comments

Comments
 (0)