-
Notifications
You must be signed in to change notification settings - Fork 10.3k
[ZT] Unified Access apps #19115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ZT] Unified Access apps #19115
Changes from 26 commits
71a10e6
90010b8
4600d62
41a4c37
22ff986
77f9122
a79476a
d3fe30a
1178e96
e2c8193
4ce53f4
3b94369
7ef9ac3
557a0d5
e0e0ab4
c635063
9d020c4
057fb2c
9b6eb8a
ef2a41d
997ec47
235e06c
10bafb8
1b09de9
6990876
31e2c37
a6cca55
27f3b31
821a78f
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -6,16 +6,16 @@ sidebar: | |
|
|
||
| --- | ||
|
|
||
| Cloudflare Access allows you to secure your web applications by acting as an identity aggregator, or proxy. Users can only log in to the application if they meet the criteria you want to introduce. | ||
| Cloudflare Access allows you to secure your web applications by acting as an identity aggregator, or proxy. You can use signals from your existing identity providers (IdPs), device posture providers, and [other rules](/cloudflare-one/policies/access/#selectors) to control who can log in to the application. | ||
|
|
||
|  | ||
|
|
||
| You can protect two types of web applications: SaaS and self-hosted. | ||
| You can protect the following types of web applications: | ||
ranbel marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| * [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday. To secure SaaS applications, you must integrate Cloudflare Access with the SaaS application's SSO configuration. | ||
| - [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday. To secure SaaS applications, you must integrate Cloudflare Access with the SaaS application's SSO configuration. | ||
|
|
||
| * [**Self-hosted applications**](/cloudflare-one/applications/configure-apps/self-hosted-apps/) consist of internal applications that you host in your own environment. These can be the data center versions of tools like the Atlassian suite or applications created by your own team. To secure self-hosted applications, you must use Cloudflare's DNS ([full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/)) and [connect the application](/cloudflare-one/connections/connect-networks/) to Cloudflare. | ||
| - **Self-hosted applications** consist of internal applications that you host in your own environment. These can be the data center versions of tools like the Atlassian suite or applications created by your own team. Setup requirements for a self-hosted application depend on whether the application is publicly accessible on the Internet or restricted to users on a private network. | ||
| - [**Public hostname applications**](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) are web applications that have public DNS records. Anyone on the Internet can access the application by entering the URL in their browser and authenticating through Cloudflare Access. Securing access to a public website requires a Cloudflare DNS [full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/). | ||
| - [**Private network applications**](/cloudflare-one/applications/non-http/self-hosted-private-app/) do not have public DNS records, meaning they are not reachable from the public Internet. To connect using a private IP or private hostname, remote users must install the WARP client on their device and enroll in your Zero Trust organization. | ||
|
||
|
|
||
| * [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) are a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits. | ||
|
|
||
| * [**Private network applications**](/cloudflare-one/connections/connect-networks/private-net/) are self-hosted applications that do not have public DNS records, meaning they are not reachable from the public Internet. To allow remote users to access these applications, you must [connect the private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/) to Cloudflare. | ||
| - [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) is a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits. | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,53 @@ | ||
| --- | ||
| pcx_content_type: how-to | ||
| title: Private network applications (legacy) | ||
| sidebar: | ||
| order: 4 | ||
| label: Private network applications (legacy) | ||
| --- | ||
|
|
||
| :::note | ||
| Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) to secure a private IP address. | ||
| ::: | ||
|
|
||
| You can configure a **Private Network** application to manage access to specific applications on your private network. | ||
|
|
||
| To create a private network application: | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications** > **Add an application**. | ||
|
|
||
| 2. Select **Private Network**. | ||
|
|
||
| 3. Name your application. | ||
|
|
||
| 4. For **Application type**, select _Destination IP_. | ||
|
|
||
| 5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`). | ||
| :::note | ||
| If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector. | ||
| ::: | ||
|
|
||
| 6. Configure your [App Launcher](/cloudflare-one/applications/app-launcher/) visibility and logo. | ||
|
|
||
| 7. Select **Next**. You will see two auto-generated Gateway Network policies: one that allows access to the destination IP and another that blocks access. | ||
|
|
||
| 8. Modify the policies to include additional identity-based conditions. For example: | ||
|
|
||
| - **Policy 1** | ||
|
|
||
| | Selector | Operator | Value | Logic | Action | | ||
| | -------------- | ------------- | ---------------- | ----- | ------ | | ||
| | Destination IP | in | `10.128.0.7` | And | Allow | | ||
| | User Email | matches regex | `.*@example.com` | | | | ||
|
|
||
| - **Policy 2** | ||
|
|
||
| | Selector | Operator | Value | Action | | ||
| | -------------- | -------- | ------------ | ------ | | ||
| | Destination IP | in | `10.128.0.7` | Block | | ||
|
|
||
| Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/). | ||
|
|
||
| 9. Select **Add application**. | ||
|
|
||
| Your application will appear on the **Applications** page. |
Uh oh!
There was an error while loading. Please reload this page.