Skip to content
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
71a10e6
self-hosted app IA
ranbel Jan 9, 2025
90010b8
update title
ranbel Jan 9, 2025
4600d62
Update index.mdx
kennyj42 Jan 10, 2025
41a4c37
update IA
ranbel Jan 10, 2025
22ff986
new self-hosted flow
ranbel Jan 11, 2025
77f9122
Merge branch 'production' into ranbel/unified-access-apps
ranbel Jan 13, 2025
a79476a
clean up self-hosted apps and links
ranbel Jan 13, 2025
d3fe30a
update tutorials that used old self-hosted app flow
ranbel Jan 13, 2025
1178e96
new Rule Groups link
ranbel Jan 13, 2025
e2c8193
fix broken link
ranbel Jan 13, 2025
4ce53f4
move ICMP content
ranbel Jan 14, 2025
3b94369
private app updates
ranbel Jan 14, 2025
7ef9ac3
update private network app
ranbel Jan 15, 2025
557a0d5
rename legacy private apps page
ranbel Jan 15, 2025
e0e0ab4
migrate legacy policy
ranbel Jan 16, 2025
c635063
update policies page
ranbel Jan 16, 2025
9d020c4
update Rule groups
ranbel Jan 16, 2025
057fb2c
update Access group language throughout docs
ranbel Jan 16, 2025
9b6eb8a
update glossary
ranbel Jan 16, 2025
ef2a41d
early access note
ranbel Jan 16, 2025
997ec47
Merge branch 'production' into ranbel/unified-access-apps
ranbel Jan 16, 2025
235e06c
Update index.mdx
kennyj42 Jan 17, 2025
10bafb8
Update self-hosted-private-app.mdx
kennyj42 Jan 17, 2025
1b09de9
Update self-hosted-private-app.mdx
kennyj42 Jan 17, 2025
6990876
Update self-hosted-private-app.mdx
kennyj42 Jan 17, 2025
31e2c37
Update self-hosted-private-app.mdx
kennyj42 Jan 17, 2025
a6cca55
Merge branch 'production' into ranbel/unified-access-apps
ranbel Jan 17, 2025
27f3b31
apply review feedback
ranbel Jan 17, 2025
821a78f
Apply suggestions from code review
maxvp Jan 17, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -10,12 +10,10 @@ Cloudflare Access allows you to secure your web applications by acting as an ide

![Cloudflare Access verifies a user's identity before granting access to your application.](~/assets/images/cloudflare-one/applications/diagram-saas.jpg)

You can protect two types of web applications: SaaS and self-hosted.
You can protect the following types of web applications:

* [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday. To secure SaaS applications, you must integrate Cloudflare Access with the SaaS application's SSO configuration.
- [**SaaS applications**](/cloudflare-one/applications/configure-apps/saas-apps/) consist of applications your team relies on that are not hosted by your organization. Examples include Salesforce and Workday.

* [**Self-hosted applications**](/cloudflare-one/applications/configure-apps/self-hosted-apps/) consist of internal applications that you host in your own environment. These can be the data center versions of tools like the Atlassian suite or applications created by your own team. To secure self-hosted applications, you must use Cloudflare's DNS ([full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/)) and [connect the application](/cloudflare-one/connections/connect-networks/) to Cloudflare.
- [**Self-hosted applications**](/cloudflare-one/applications/configure-apps/self-hosted-apps/) consist of internal applications that you host in your own environment. These can be hosted versions of tools like the Atlassian suite or applications created and hosted by your own team.

* [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) are a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits.

* [**Private network applications**](/cloudflare-one/connections/connect-networks/private-net/) are self-hosted applications that do not have public DNS records, meaning they are not reachable from the public Internet. To allow remote users to access these applications, you must [connect the private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/) to Cloudflare.
- [**Cloudflare Dashboard SSO**](/cloudflare-one/applications/configure-apps/dash-sso-apps/) is a special type of SaaS application that manages SSO settings for the Cloudflare dashboard and has limited permissions for administrator edits.
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
---
pcx_content_type: concept
title: Self-hosted applications
sidebar:
order: 1

---

import { Render } from "~/components"

Cloudflare Access allows you to secure internal tools and applications by providing an authentication layer between the end user and your origin server. You can use signals from your existing identity providers (IdPs), device posture providers, and [other rules](/cloudflare-one/policies/access/#selectors) to control who can access your application. You can scope your policies to an entire private IP range, or define granular rules for specific websites, subdomains, and paths.

![Cloudflare Access authenticates users to your internal applications.](~/assets/images/cloudflare-one/applications/network-diagram.png)

The setup process for a self-hosted application depends on whether the application is publicly accessible on the Internet or restricted to users on a private network.

- [**Public hostname applications**](/cloudflare-one/applications/configure-apps/self-hosted-apps/public-hostname-app/) are self-hosted applications that have public DNS records. Anyone on the Internet can access the application by entering the URL in their browser and authenticating through Cloudflare Access. Securing access to a public website requires a Cloudflare DNS [full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/).

- [**Private network applications**](/cloudflare-one/connections/connect-networks/private-net/) are self-hosted applications that do not have public DNS records, meaning they are not reachable from the public Internet. Remote users must install the WARP client on their device and connect to the application using its private IP or private hostname. To add a private network application, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/).
Original file line number Diff line number Diff line change
@@ -1,16 +1,14 @@
---
pcx_content_type: how-to
title: Self-hosted applications
title: Publish a self-hosted application to the Internet
sidebar:
order: 2

order: 1
label: Public hostname applications
---

import { Render } from "~/components"

<Render file="access/self-hosted-intro" />

![Cloudflare Access authenticates users to your internal applications.](~/assets/images/cloudflare-one/applications/network-diagram.png)

## Prerequisites

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,8 @@ sidebar:

import { Render } from "~/components"

<Render file="access/self-hosted-intro" product="cloudflare-one" />
Cloudflare Access allows you to securely publish internal tools and applications to the Internet by providing an authentication layer between the end user and your origin server. You can use signals from your existing identity providers (IdPs), device posture providers, and [other rules](/cloudflare-one/policies/access/#selectors) to control who can access your application.

Each application can have multiple policies with different constraints depending on what user group is accessing the application. For example, you can create one policy that requires corporate users to present specific device posture checks or mutual TLS authentication events, and a second policy for contractors which does not require these attributes.

## Add your application to Access
Expand Down

This file was deleted.

Loading