Cloudflare - Cloudflare Access: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
Cloudflare Access is a zerotrust security product that authenticates and authorizes user access to applications deployed behind the Cloudflare network. It does this by enforcing authentication and authorization policies that are set by the application owner. Users are authenticated and authorized based on their identity, which is verified using industry-standard protocols such as SAML, OIDC, and LDAP.=More Information= | <br> | ||
Cloudflare Access is a zerotrust security product that authenticates and authorizes user access to applications deployed behind the Cloudflare network. It does this by enforcing authentication and authorization policies that are set by the application owner. Users are authenticated and authorized based on their identity, which is verified using industry-standard protocols such as SAML, OIDC, and LDAP. Cloudflare Access also provides a flexible rules engine that can be used to granularly control access | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://www.cloudflare.com/zero-trust/products/access/ | https://www.cloudflare.com/zero-trust/products/access/ |
Latest revision as of 05:01, 23 April 2024
Description
Cloudflare Access is a zerotrust security product that authenticates and authorizes user access to applications deployed behind the Cloudflare network. It does this by enforcing authentication and authorization policies that are set by the application owner. Users are authenticated and authorized based on their identity, which is verified using industry-standard protocols such as SAML, OIDC, and LDAP. Cloudflare Access also provides a flexible rules engine that can be used to granularly control access