Skip to content
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions src/content/changelogs/access.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,18 @@ entries:
title: Access Applications support private hostnames/IPs and reusable Access policies.
description: |-
Cloudflare Access self-hosted applications can now be defined by [private IPs](/cloudflare-one/applications/non-http/self-hosted-private-app/), [private hostnames](/cloudflare-one/applications/non-http/self-hosted-private-app/) (on port 443) and [public hostnames](/cloudflare-one/applications/configure-apps/self-hosted-public-app/). Additionally, we made Access policies into their own object which can be reused across multiple applications. These updates involved significant updates to the overall Access dashboard experience. The updates will be slowly rolled out to different customer cohorts. If you are an Enterprise customer and would like early access, reach out to your account team.
- publish_date: "2025-01-15"
title: Logpush for SSH command logs
description: |-
Access for Infrastructure now supports exporting SSH command logs using [Logpush](/cloudflare-one/insights/logs/logpush/).
- publish_date: "2024-12-04"
title: SCIM GA for Okta and Microsoft Entra ID
description: |-
Cloudflare's SCIM integrations with [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) and [Microsoft Entra ID](//cloudflare-one/identity/idp-integration/entra-id/#synchronize-users-and-groups) (formerly AzureAD) are now out of beta and generally available (GA) for all customers. These integrations can be used for Access and Gateway policies and Zero Trust user management. Note: This GA release does not include [Dashboard SSO SCIM](/fundamentals/setup/account/account-security/scim-setup/) support.
- publish_date: "2024-10-23"
title: SSH with Access for Infrastructure
description: |-
Admins can now use [Access for Infrastructure](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to manage privileged access to SSH servers. Access for Infrastructure provides improved control and visibility over who accessed what service and what they did during their SSH session, while also eliminating the risk and overhead associated with managing SSH keys.
- publish_date: "2024-08-26"
title: Reduce automatic seat deprovisioning minimum to 1 month, down from 2 months.
description: |-
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,8 @@ sidebar:

import { Tabs, TabItem, Badge, Render } from "~/components";

[Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) uses the same deployment model as [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/) but unlocks more granular policy options and command logging functionality.
[Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) provides granular control over how users can connect to your SSH servers. This feature uses the same deployment model as [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/) but unlocks more policy options and command logging functionality.

<Render file="access/short-lived-certs-intro" params={{ intro: "Furthermore, Access for Infrastructure replaces" }} />

## 1. Connect the server to Cloudflare
Expand Down