
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 18:04:21 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Now You Can Setup Centrify, OneLogin, Ping and Other Identity Providers with Cloudflare Access]]></title>
            <link>https://blog.cloudflare.com/new-identity-providers-with-cloudflare-access/</link>
            <pubDate>Mon, 23 Apr 2018 19:08:18 GMT</pubDate>
            <description><![CDATA[ Today we would like to announce support for two more Identity Providers with Cloudflare Access: Centrify and OneLogin. If you are using Centrify or OneLogin as your identity provider you can now easily integrate them with Cloudflare Access. ]]></description>
            <content:encoded><![CDATA[ <p>We use Cloudflare Access to secure our own internal tools instead of a VPN. As someone that does a lot of work on the train, I can attest this is awesome (though I might be biased). You can see it in action below. Instead of having to connect to a VPN to reach our internal jira, we just login with our Google account and we are good to go:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66EeaOGaA29Ge4ilWvc8kg/42bc0260806755ff5905e6c57a443030/CFAccess-JIRAv3.gif" />
            
            </figure><p>Before today, you could setup Access if you used GSuite, Okta or Azure AD to manage your employee accounts. Today we would like to announce support for two more Identity Providers with Cloudflare Access: <a href="https://www.centrify.com/">Centrify</a> and <a href="https://www.onelogin.com/">OneLogin</a>.</p><p>We launched Cloudflare Access earlier this year and have been overwhelmed by the response from our customers and community. Customers tell us they love the simplicity of setting up Access to secure applications and integrate with their existing identity provider solution. Access helps customers implement a holistic solution for both corporate and remote employees without having to use a VPN.</p><p>If you are using Centrify or OneLogin as your identity provider you can now easily integrate them with Cloudflare Access and have your team members login with their accounts to securely reach your internal tools.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ja7n6yKRWlNqZg00CjWSN/398b05db0a48c4fc4098a044f0eadcaf/CFAccess-ssov3.gif" />
            
            </figure><p>Oh and one last thing, We have a new generic connector which allows you to integrate any OIDC based identity provider with Cloudflare Access. <a href="https://en.wikipedia.org/wiki/OpenID_Connect">OpenID Connect</a> (OIDC) is supported by many identity providers (some popular OIDC based Identity Providers are Ping Identity and Forgerock)</p><p>If you’re eager to get started, steps are below for configuring OneLogin, Centrify and a custom OIDC provider. Each take about 3-5 minutes. Hope you enjoy!</p>
    <div>
      <h3>Steps for setting up Centrify</h3>
      <a href="#steps-for-setting-up-centrify">
        
      </a>
    </div>
    <p>Login to your Centrify admin portal and click on apps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Mtdp3uJp4F4CpKZ6XJkBd/5c216719e92ef4208d3f5877e19109a7/cfy1.png" />
            
            </figure><p>Click on Add Web Apps and navigate to custom tab. Scroll down and click Add on OpenID Connect.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72Mk8PuLt20Wc3YXpZyIR/90916ad14e0d4866fa8be45ea2ac1d02/cfy2.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JZR2XBOpVN44zeSV8jXR5/adbf36479f6faeca0d1dc3778e6c2a86/cfy3.png" />
            
            </figure><p>Click Yes on the Application modal to create an OpenID Connect app.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4HbONg5UwY3Kiana5ZK6ZL/8d020b377730a0bd7728362dae423519/cfy4.png" />
            
            </figure><p>Enter an Application ID and click save.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7lneON5LpL3GtMgRXvlKJB/e7e7874b44c7aa8111619e5f5c1e8ec7/cfy5.png" />
            
            </figure><p>Navigate to the trust tab and enter a strong application secret. Under the Service Provider configuration enter your application's <code>authentication domain</code> as the Resource application URL. Click Add on Authorized redirect URIs and put your <code>authentication domain/cdn-cgi/access/callback</code>. Click Save.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37vnOWfySw7xPu41qHjcvf/b0195ad93018694eb44ce4c0f92a86e8/cfy6.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30bmxJ1A8zyCVuwy0VDMMi/8661a2f52eaf6602b3405f43d92ecbac/cfy7.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SDGGakLTEvDGkpaAIvJ3W/b89fcfac96317ec8d07848c5e53682a0/cfy8-1.png" />
            
            </figure><p>Now copy your Client ID, Client Secret, OpenID Connect Issuer URL without the forward slash and Application ID from Settings tab in the Centrify dashboard and then paste them into the Cloudflare dashboard.</p>
    <div>
      <h3>Steps for setting up OneLogin</h3>
      <a href="#steps-for-setting-up-onelogin">
        
      </a>
    </div>
    <p>Login to your Onelogin admin portal and click on custom connectors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CMNwom6XvxoXat3eRnqlY/f3f12d8d7c6f6daa5249be3ed495c467/ol1.png" />
            
            </figure><p>Click on New Connector</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xeqClwLeKJKo0OI021YOz/c4ad03fac3b28d61a1d63b9d37f989f3/ol2.png" />
            
            </figure><p>Name the connector and select OpenID Connect as the sign on method.In the redirect URI field, put your authentication domain/cdn-cgi/access/callback. Click Save.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TuzZH8UfZmR12BB9NiGxP/50826079e277ae0a81585b92e255e4fd/ol3.png" />
            
            </figure><p>Click on More Actions and select Add App to Connector.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2XV8QlsxBvnZ22b2lVclSy/7d5ae9ef2be3dac2426319dc5b1cb3fb/ol4.png" />
            
            </figure><p>Name the app and click save.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OC4RXHi0mhOjhurPEWxAc/75859c5f56ff632c4fdb86e8307f8736/ol5.png" />
            
            </figure><p>Navigate to the SSO tab and click on show client secret.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JxZ3UnckodE00g1AnWEKp/ddcd84fc272b5fd34ebc97d8fc48e335/ol6-1.png" />
            
            </figure><p>Now copy your Client ID and Client Secret from the Onelogin dashboard and then paste them into the Cloudflare dashboard.</p>
    <div>
      <h3>Setting up a custom identity provider using OIDC</h3>
      <a href="#setting-up-a-custom-identity-provider-using-oidc">
        
      </a>
    </div>
    <p>The following are the information you would need from your identity provider into the Cloudflare Dashboard.</p><ul><li><p>Client ID and Client Secret: IdPs let you create a client or an app for each custom integration. You can create one for Access and grab the client id and secret.</p></li><li><p>Auth URL: This is the authorization_endpoint URL of your IdP.</p></li><li><p>Token URL: This is the token_endpoint URL of your IdP.</p></li><li><p>Certificate URL: The jwks_uri endpoint of your IdP is where you get the keys used by the IdP to sign the tokens.</p></li></ul><p>All the above endpoint values can be obtained from your IdP's OIDC discovery endpoint which is also called as the well-known URL. For example if you use Ping as your identity the URL would be <code>&lt;hostname&gt;/.well-known/openid-configuration</code></p><p>Give your IdP connector a name of your choice by entering it in the Name field.</p><p>In your IdP's Authorized redirect URI field, put your <code>authentication domain/cdn-cgi/access/callback</code> URL.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Authentication]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">pxzzVtHR46jBBt3HF3i65</guid>
            <dc:creator>Venkat Viswanathan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Access: Like BeyondCorp, But You Don’t Have To Be A Google Employee To Use It]]></title>
            <link>https://blog.cloudflare.com/introducing-cloudflare-access/</link>
            <pubDate>Wed, 17 Jan 2018 14:00:00 GMT</pubDate>
            <description><![CDATA[ Tell me if this sounds familiar: any connection from inside the corporate network is trusted and any connection from the outside is not. This is the security strategy used by most enterprises today. The problem is that security is breached, the attacker has access to everything. ]]></description>
            <content:encoded><![CDATA[ <p>Tell me if this sounds familiar: any connection from inside the corporate network is trusted and any connection from the outside is not. This is the security strategy used by most enterprises today. The problem is that once the firewall, or gateway, or VPN server creating this perimeter is breached, the attacker gets immediate, easy and trusted access to everything.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IsJrQb7zEktUTKCXlyhRC/76964573751942b689aa78558e8452ac/4859761438_0778df5e52_o.jpg" />
            
            </figure><p> <a href="https://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> image by <a href="https://www.flickr.com/photos/wwarby/">William Warby</a></p><p>There’s a second problem with the traditional <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">security perimeter model</a>. It either requires employees to be on the corporate network (i.e. physically in the office) or using a VPN, which slows down work because every page load makes extra round trips to the VPN server. After all this hassle, users on the VPN are still highly susceptible to phishing, on-path and SQL injection attacks.</p><p>A few years ago, Google pioneered a solution for their own employees called BeyondCorp. Instead of keeping their internal applications on the intranet, they made them accessible on the internet. There became no concept of in or outside the network. The network wasn’t some fortified citadel, everything was on the internet, and no connections were trusted. Everyone had to prove they are who they say they are.</p><p>Cloudflare’s mission has always been to democratize the tools of the internet giants. Today we are launching <a href="https://www.cloudflare.com/products/cloudflare-access/?utm_medium=website&amp;utm_source=blog&amp;utm_campaign=access-launch">Cloudflare Access</a>: a perimeter-less access control solution for cloud and on-premise applications. It’s like BeyondCorp, but you don’t have to be a Google employee to use it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XLMNQA8Z6Namjrt7hZ4Xn/da771b1a788432d6ebd25c62f671fc12/Access-blog-post-diagramv2.png" />
            
            </figure>
    <div>
      <h3>How does Cloudflare Access work ?</h3>
      <a href="#how-does-cloudflare-access-work">
        
      </a>
    </div>
    <p>Access acts as an unified reverse proxy to enforce access control by making sure every request is:</p><p><b>Authenticated:</b> Access integrates out of the box with most of the major identity providers like Google, Azure Active Directory and Okta meaning you can quickly connect your existing identity provider to Cloudflare and use the groups and users already created to gate access to your web applications. You can additionally use <a href="/introducing-tls-client-auth/">TLS with Client Authentication</a> and limit connections only to devices with a unique client certificate. Cloudflare will ensure the connecting device has a valid client certificate signed by the corporate CA, then Cloudflare will authenticate user credentials to grant access to an internal application.</p><p><b>Authorized:</b> The solution lets you easily <a href="https://www.cloudflare.com/application-services/solutions/">protect application resources</a> by configuring access policies for groups and individual users that you already created with your identity providers. For example, you could ensure with Access that only your company employees can get to your internal kanban board, or <a href="https://www.cloudflare.com/learning/security/how-to-improve-wordpress-security/">lock down</a> the wp-admin of your wordpress site.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YkWbPMW9g32FDBjfC5T63/6006588940350759fa2d8c08fb72780d/access-policy.png" />
            
            </figure><p><b>Encrypted:</b> As Cloudflare makes all connections secure with HTTPS there is no need for a VPN.</p><p>To all the IT administrators who’ve been chastised by a globetrotting executive about how slow the VPN makes the Internet, Access is the perfect solution. It enables you to control and monitor access to applications by providing the following features via the dashboard and APIs:</p><ul><li><p>Easily change access policies</p></li><li><p>Modify session durations</p></li><li><p>Revoke existing user sessions</p></li><li><p>Centralized logging for audit and change logs</p></li></ul><p>Want an even faster connection to replace your VPN? Try pairing Access with <a href="https://www.cloudflare.com/argo/">Argo</a>. If you want to use Access in front of an internal application but don’t want to open up that application to the whole internet, you can combine Access with <a href="https://www.cloudflare.com/products/cloudflare-warp/">Argo Tunnel</a>. Argo Tunnel will make Cloudflare your application’s internet connection so you don’t even need a public IP. If you want to use Access in front of a legacy application and protect that application from unpatched vulnerabilities in legacy software, you can just click to enable the <a href="https://www.cloudflare.com/waf/">Web Application Firewall</a> and Cloudflare will inspect packets and block those with exploits.</p><p>Cloudflare Access allows employees to connect to corporate applications from any device, any place and on any kind of network. Access is powered by Cloudflare’s global network of 120+ data centers offering adequate redundancy and <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> and proximity to wherever your employees or corporate office might be.</p>
    <div>
      <h3>Get Started:</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>Access takes 5-10 minutes to setup and is free to try for up to one user (beyond that it’s $3 per seat per month, and you can <a href="https://www.cloudflare.com/plans/enterprise/contact/?utm_medium=website&amp;utm_source=product&amp;utm_campaign=access">contact sales</a> for bulk discounts). Cloudflare Access is fully available for our enterprise customers today and in open beta for our Free, Pro and Business plan customers. To get started, <a href="https://cloudflare.com/a/access">go to the Access tab of the Cloudflare dashboard</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Authentication]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5SvTVXWabzrVQDt6K5wLf4</guid>
            <dc:creator>Venkat Viswanathan</dc:creator>
        </item>
    </channel>
</rss>