Skip to content

Commit fec1e07

Browse files
authored
Update 2025-10-28-Access-Application-Support-For-All-Ports-And-Protocols.mdx
1 parent 0ff7ff1 commit fec1e07

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

src/content/changelog/access/2025-10-28-Access-Application-Support-For-All-Ports-And-Protocols.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ products:
66
- access
77
---
88

9-
[Cloudflare Access for private hostname applications](cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) can now secure traffic on all ports and protocols. 🔒
9+
[Cloudflare Access for private hostname applications](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) can now secure traffic on all ports and protocols.
1010

11-
Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port 443 and support Server Name Indicator (SNI).
11+
Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port `443` and support Server Name Indicator (SNI).
1212

13-
This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controlslike single sign-on (SSO), MFA, device posture, and variable session lengthsto any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTP applications.
13+
This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controlslike single sign-on (SSO), MFA, device posture, and variable session lengthsto any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTPS applications.
1414

1515
![Example private application on non-443 port](~/assets/images/changelog/access/internal_private_app_any_port.png)
1616

17-
For example, you can now create a self-hosted application in Access for ssh.testapp.local running on port 22. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.
17+
For example, you can now create a self-hosted application in Access for `ssh.testapp.local` running on port `22`. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.
1818

1919
This feature is generally available across all plans.

0 commit comments

Comments
 (0)