
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 11 Apr 2026 20:57:10 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Deploy your own AI vibe coding platform — in one click! ]]></title>
            <link>https://blog.cloudflare.com/deploy-your-own-ai-vibe-coding-platform/</link>
            <pubDate>Tue, 23 Sep 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Introducing VibeSDK, an open-source AI "vibe coding" platform that anyone can deploy to build their own custom platform. Comes ready with code generation, sandbox environment, and project deployment.  ]]></description>
            <content:encoded><![CDATA[ <p>It’s an exciting time to build applications. With the recent AI-powered <a href="https://www.cloudflare.com/learning/ai/ai-vibe-coding/"><u>"vibe coding"</u></a> boom, anyone can build a website or application by simply describing what they want in a few sentences. We’re already seeing organizations expose this functionality to both their users and internal employees, empowering anyone to build out what they need.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40Jzjser2hE91b1y3p80pm/7bc1a7f0ee4cfaeb7a39bb413969b189/1.png" />
          </figure><p>Today, we’re excited to open-source an AI vibe coding platform, VibeSDK, to enable anyone to run an entire vibe coding platform themselves, end-to-end, with just one click.</p><p>Want to see it for yourself? Check out our <a href="https://build.cloudflare.dev/"><u>demo platform</u></a> that you can use to create and deploy applications. Or better yet, click the button below to deploy your own AI-powered platform, and dive into the repo to learn about how it’s built.</p><a href="https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/vibesdk"><img src="https://deploy.workers.cloudflare.com/button" /></a>
<p></p><p>Deploying VibeSDK sets up everything you need to run your own AI-powered development platform:</p><ul><li><p><b>Integration with LLM models</b> to generate code, build applications, debug errors, and iterate in real-time, powered by <a href="https://developers.cloudflare.com/agents/"><u>Agents SDK</u></a>. </p></li><li><p><b>Isolated development environments </b>that allow users to safely build and preview their applications in secure sandboxes.</p></li><li><p><b>Infinite scale</b> that allows you to deploy thousands or even millions of applications that end users deploy, all served on Cloudflare’s global network</p></li><li><p><b>Observability and caching</b> across multiple AI providers, giving you <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">insight into costs and performance</a> with built-in caching for popular responses. </p></li><li><p><b>Project templates</b> that the LLM can use as a starting point to build common applications and speed up development.</p></li><li><p><b>One-click project export</b> to the user’s Cloudflare account or GitHub repo, so users can take their code and continue development on their own.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jsExecZKmgJHARsxDsMkM/60803b1ba2c68514a053f4d000bf8576/2.png" />
          </figure><p><b>Building an AI vibe coding platform from start to finish</b></p><p><b>Step 0: Get started immediately with VibeSDK</b></p><p>We’re seeing companies build their own AI vibe coding platforms to enable both internal and external users. With a vibe coding platform, internal teams like marketing, product, and support can build their own landing pages, prototypes, or internal tools without having to rely on the engineering team. Similarly, SaaS companies can embed this capability into their product to allow users to build their own customizations. </p><p>Every platform has unique requirements and specializations. By <a href="https://www.cloudflare.com/learning/ai/how-to-get-started-with-vibe-coding/">building your own</a>, you can write custom logic to prompt LLMs for your specific needs, giving your users more relevant results. This also grants you complete control over the development environment and <a href="https://www.cloudflare.com/developer-platform/solutions/hosting/">application hosting</a>, giving you a secure platform that keeps your data private and within your control. </p><p>We wanted to make it easy for anyone to build this themselves, which is why we built a complete platform that comes with project templates, previews, and project deployment. Developers can repurpose the whole platform, or simply take the components they need and customize them to fit their needs.</p><p><b>Step 1: Finding a safe, isolated environment for running untrusted, AI generated code</b></p><p>AI can now build entire applications, but there's a catch: you need somewhere safe to run this untrusted, AI-generated code. Imagine if an <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>LLM</u></a> writes an application that needs to install packages, run build commands, and start a development server — you can't just run this directly on your infrastructure where it might affect other users or systems.</p><p>With <a href="https://developers.cloudflare.com/changelog/2025-06-24-announcing-sandboxes/"><u>Cloudflare Sandboxes</u></a>, you don't have to worry about this. Every user gets their own isolated environment where the AI-generated code can do anything a normal development environment can do: install npm packages, run builds, start servers, but it's fully contained in a secure, container-based environment that can't affect anything outside its sandbox. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AVtsIotiISgrjspHaRLsg/6cd2e56d5edb7021d63c01183362aafe/3.png" />
          </figure><p>The platform assigns each user to their own sandbox based on their session, so that if a user comes back, they can continue to access the same container with their files intact:</p>
            <pre><code>// Creating a sandbox client for a user session
const sandbox = getSandbox(env.Sandbox, sandboxId);

// Now AI can safely write and execute code in this isolated environment
await sandbox.writeFile('app.js', aiGeneratedCode);
await sandbox.exec('npm install express');
await sandbox.exec('node app.js');</code></pre>
            <p><b>Step 2: Generating the code</b></p><p>Once the sandbox is created, you have a development environment that can bring the code to life. VibeSDK orchestrates the whole workflow from writing the code, installing the necessary packages, and starting the development server. If you ask it to build a to-do app, it will generate the React application, write the component files, run <code>bun install</code> to get the dependencies, and start the server, so you can see the end result. </p><p>Once the user submits their request, the AI will generate all the necessary files, whether it's a React app, Node.js API, or full-stack application, and write them directly to the sandbox:</p>
            <pre><code>async function generateAndWriteCode(instanceId: string) {
    // AI generates the application structure
    const aiGeneratedFiles = await callAIModel("Create a React todo app");
    
    // Write all generated files to the sandbox
    for (const file of aiGeneratedFiles) {
        await sandbox.writeFile(
            `${instanceId}/${file.path}`,
            file.content
        );
        // User sees: "✓ Created src/App.tsx"
        notifyUser(`✓ Created ${file.path}`);
    }
}</code></pre>
            <p>To speed this up even more, we’ve provided a set of templates, stored in an <a href="https://www.cloudflare.com/developer-platform/products/r2/"><u>R2 bucket</u></a>, that the platform can use and quickly customize, instead of generating every file from scratch. This is just an initial set, but you can expand it and add more examples. </p><p><b>Step 3: Getting a preview of your deployment</b></p><p>Once everything is ready, the platform starts the development server and uses the Sandbox SDK to expose it to the internet with a public preview URL which allows users to instantly see their AI-generated application running live:</p>
            <pre><code>// Start the development server in the sandbox
const processId = await sandbox.startProcess(
    `bun run dev`, 
    { cwd: instanceId }
);

// Create a public preview URL 
const preview = await sandbox.exposePort(3000, { 
    hostname: 'preview.example.com' 
});

// User instantly gets: "https://my-app-xyz.preview.example.com"
notifyUser(`✓ Preview ready at: ${preview.url}`);</code></pre>
            <p><b>Step 4: Test, log, fix, repeat</b></p><p>But that’s not all! Throughout this process, the platform will capture console output, build logs, and error messages and feed them back to the LLM for automatic fixes. As the platform makes any updates or fixes, the user can see it all happening live — the file editing, installation progress, and error resolution. </p><p>Deploying applications: From Sandbox to Region Earth</p><p>Once the application is developed, it needs to be deployed. The platform packages everything in the sandbox and then uses a separate specialized "deployment sandbox" to deploy the application to <a href="https://www.cloudflare.com/developer-platform/products/workers/"><u>Cloudflare Workers</u></a>. This deployment sandbox runs <code>wrangler deploy</code> inside the secure environment to publish the application to Cloudflare's global network. </p><p>Since the platform may deploy up to thousands or millions of applications, Workers for Platforms is used to deploy the Workers at scale. Although all the Workers are deployed to the same Namespace, they are all isolated from one another by default, ensuring there’s no cross-tenant access. Once deployed, each application receives its own isolated Worker instance with a unique public URL like <code>my-app.vibe-build.example.com</code>. </p>
            <pre><code>async function deployToWorkersForPlatforms(instanceId: string) {
    // 1. Package the app from development sandbox
    const devSandbox = getSandbox(env.Sandbox, instanceId);
    const packagedApp = await devSandbox.exec('zip -r app.zip .');
    
    // 2. Transfer to specialized deployment sandbox
    const deploymentSandbox = getSandbox(env.DeployerServiceObject, 'deployer');
    await deploymentSandbox.writeFile('app.zip', packagedApp);
    await deploymentSandbox.exec('unzip app.zip');
    
    // 3. Deploy using Workers for Platforms dispatch namespace
    const deployResult = await deploymentSandbox.exec(`
        bunx wrangler deploy \\\\
        --dispatch-namespace vibe-sdk-build-default-namespace
    `);
    
    // Each app gets its own isolated Worker and unique URL
    // e.g., https://my-app.example.com
    return `https://${instanceId}.example.com`;
}</code></pre>
            <p><b>Exportable Applications </b></p><p>The platform also allows users to export their application to their own Cloudflare account and GitHub repo, so they can continue the development on their own. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3itKLSmnTzk2NapoaDQG6e/a0aba26f83cb01db5bd7957a8dfe18f4/Screenshot_2025-09-23_at_9.22.28%C3%A2__AM.png" />
          </figure><p>Observability, caching, and multi-model support built in! </p><p>It's no secret that LLM models have their specialties, which means that when building an AI-powered platform, you may end up using a few different models for different operations. By default, VibeSDK leverages Google’s Gemini models (gemini-2.5-pro, gemini-2.5-flash-lite, gemini-2.5-flash) for project planning, code generation, and debugging. </p><p>VibeSDK is automatically set up with <a href="https://www.cloudflare.com/developer-platform/products/ai-gateway/"><u>AI Gateway</u></a>, so that by default, the platform is able to:</p><ul><li><p>Use a unified access point to <a href="https://blog.cloudflare.com/ai-gateway-aug-2025-refresh/"><u>route requests across LLM providers</u></a>, allowing you to use models from a range of providers (OpenAI, Anthropic, Google, and others)</p></li><li><p>Cache popular responses, so when someone asks to "build a to-do list app", the gateway can serve a cached response instead of going to the provider (saving inference costs)</p></li><li><p>Get observability into the requests, tokens used, and response times across all providers in one place</p></li><li><p>Track costs across models and integrations</p></li></ul><p>Open sourced, so you can build your own Platform! </p><p>We're open-sourcing VibeSDK for the same reason Cloudflare open-sourced the Workers runtime — we believe the best development happens in the open. That's why we wanted to make it as easy as possible for anyone to build their own AI coding platform, whether it's for internal company use, for your website builder, or for the next big vibe coding platform. We tied all the pieces together for you, so you can get started with the click of a button instead of spending months figuring out how to connect everything yourself. To learn more, check out our <a href="https://developers.cloudflare.com/reference-architecture/diagrams/ai/ai-vibe-coding-platform/"><u>reference architecture</u></a> for vibe coding platforms. </p><a href="https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/vibesdk"><img src="https://deploy.workers.cloudflare.com/button" /></a>
<p></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sjy1OUciwTKnKmhXJfbLQ/d0e01bee3867d639077f134fc6374948/5.png" />
          </figure><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Containers]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <guid isPermaLink="false">6hS4bQv1FRDVwOoB1HrU3u</guid>
            <dc:creator>Ashish Kumar Singh</dc:creator>
            <dc:creator>Abhishek Kankani</dc:creator>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Vulnerability disclosure on SSL for SaaS v1 (Managed CNAME)]]></title>
            <link>https://blog.cloudflare.com/vulnerability-disclosure-on-ssl-for-saas-v1-managed-cname/</link>
            <pubDate>Fri, 01 Aug 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ An upcoming vulnerability disclosure in Cloudflare’s SSL for SaaSv1 is detailed, explaining the steps we’ve taken towards deprecation. ]]></description>
            <content:encoded><![CDATA[ <p>Earlier this year, a group of external researchers identified and reported a vulnerability in Cloudflare’s SSL for SaaS v1 (Managed CNAME) product offering through Cloudflare’s <a href="https://hackerone.com/cloudflare?type=team"><u>bug bounty</u></a> program. We officially deprecated SSL for SaaS v1 in 2021; however, some customers received extensions for extenuating circumstances that prevented them from migrating to SSL for SaaS v2 (Cloudflare for SaaS). We have continually worked with the remaining customers to migrate them onto Cloudflare for SaaS over the past four years and have successfully migrated the vast majority of these customers. For most of our customers, there is no action required; for the very small number of SaaS v1 customers, we will be actively working to help migrate you to SSL for SaaS v2 (Cloudflare for SaaS).   </p>
    <div>
      <h2>Background on SSL for SaaS v1 at Cloudflare</h2>
      <a href="#background-on-ssl-for-saas-v1-at-cloudflare">
        
      </a>
    </div>
    <p>Back in 2017, Cloudflare <a href="https://blog.cloudflare.com/introducing-ssl-for-saas/"><u>announced SSL for SaaS</u></a>, a product that allows SaaS providers to extend the benefits of Cloudflare security and performance to their end customers. Using a “Managed CNAME” configuration, providers could bring their customer’s domain onto Cloudflare. In the first version of SSL for SaaS (v1), the traffic for Custom Hostnames is proxied to the origin based on the IP addresses assigned to the zone. In this Managed CNAME configuration, the end customers simply pointed their domains to the SaaS provider origin using a CNAME record. The customer’s origin would then be configured to accept traffic from these hostnames. </p>
    <div>
      <h2>What are the security concerns with v1 (Managed CNAME)?</h2>
      <a href="#what-are-the-security-concerns-with-v1-managed-cname">
        
      </a>
    </div>
    <p>While SSL for SaaS v1 enabled broad adoption of Cloudflare for end customer domains, its architecture introduced a subtle but important security risk – one that motivated us to build Cloudflare for SaaS. </p><p>As adoption scaled, so did our understanding of the security and operational limitations of SSL for SaaS v1. The architecture depended on IP-based routing and didn’t verify domain ownership before proxying traffic. That meant that any custom hostname pointed to the correct IP could be served through Cloudflare — even if ownership hadn’t been proven. While this produced the desired functionality, this design introduced risks and created friction when customers needed to make changes without downtime. </p><p>A malicious CF user aware of another customer's Managed CNAME (via social engineering or publicly available info), could abuse the way SSL for SaaS v1 handles host header redirects through DNS manipulation and Man-in-The-Middle attack because of the way Cloudflare serves the valid TLS certificate for the Managed CNAME.</p><p>For regular connections to Cloudflare, the certificate served by Cloudflare is determined by the <a href="https://www.cloudflare.com/learning/ssl/what-is-sni/"><u>SNI provided by the client in the TLS handshake</u></a>, while the zone configuration applied to a request is determined based on the host-header of the HTTP request.</p><p>In contrast, SSL for SaaS v1/Managed CNAME setups work differently. The certificate served by Cloudflare is still based on the TLS SNI, but the zone configuration is determined solely based on the specific Cloudflare anycast IP address the client connected to.</p><p>For example, let’s assume that <code>192.0.2.1</code> is the anycast IP address assigned to a SaaS provider. All connections to this IP address will be routed to the SaaS provider's origin server, irrespective of the host-header in the HTTP request. This means that for the following request:</p>
            <pre><code>$ curl --connect-to ::192.0.2.1 https://www.cloudflare.com</code></pre>
            <p>The certificate served by Cloudflare will be valid for <a href="http://www.cloudflare.com"><u>www.cloudflare.com</u></a>, but the request will not be sent to the origin server of <a href="http://www.cloudflare.com"><u>www.cloudflare.com</u></a>. It will instead be sent to the origin server of the SaaS provider assigned to the <code>192.0.2.1</code> IP address.</p><p>While the likelihood of exploiting this vulnerability is low and requires multiple complex conditions to be met, the vulnerability can be paired with other issues and potentially exploit other Cloudflare customers if:</p><ol><li><p>The adversary is able to perform <a href="https://www.cloudflare.com/learning/dns/dns-cache-poisoning/"><u>DNS poisoning</u></a> on the target domain to change the IP address that the end-user connects to when visiting the target domain</p></li><li><p>The adversary is able to place a malicious payload on the Managed CNAME customer’s website, or discovers an existing cross-site scripting vulnerability on the website</p></li></ol>
    <div>
      <h2>Mitigation: A Phased Transition</h2>
      <a href="#mitigation-a-phased-transition">
        
      </a>
    </div>
    <p>To address these challenges, we launched SSL for SaaS v2 (Cloudflare for SaaS) and <a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/reference/versioning/"><u>deprecated SSL for SaaS v1</u></a> in 2021. Cloudflare for SaaS transitioned away from IP-based routing towards a verified custom hostname model. Now, custom hostnames must pass a <a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/"><u>hostname verification step</u></a> alongside SSL certificate validation to proxy to the customer origin. This improves security by limiting origin access to authorized hostnames and reduces downtime through<a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/pre-validation/"><u> hostname pre-validation</u></a>, which allows customers to verify ownership before traffic is proxied through Cloudflare.</p><p>When Cloudflare for SaaS became generally available, we began a careful and deliberate deprecation of the original architecture. Starting in March 2021, we notified all v1 users of the then upcoming sunset in favor of v2 in September 2021 with instructions to migrate. Although we officially deprecated Managed CNAME, some customers were granted exceptions and various zones remained on SSL for SaaS v1. Cloudflare was notified this year through our Bug Bounty program that an external researcher had identified the SSL for SaaS v1 vulnerabilities in the midst of our continued efforts to migrate all customers.</p><p>The majority of customers have successfully migrated to the modern v2 setup. For those few that require more time to migrate, we've implemented compensating controls to limit the potential scope and reach of this issue for the remaining v1 users. Specifically:</p><ul><li><p>This feature is unavailable for new customer accounts, and new zones within existing customer accounts, to configure via the UI or API</p></li><li><p>Cloudflare actively maintains an allowlist of zones &amp; customers that currently use the v1 service</p></li></ul><p>We have also implemented WAF custom rules configurations for the remaining customers such that any requests targeting an unauthorized destination will be caught and blocked in their L7 firewall.</p><p>The architectural improvement of Cloudflare for SaaS not only closes the gap between certificate and routing validation but also ensures that only verified and authorized domains are routed to their respective origins—effectively eliminating this class of vulnerability.</p>
    <div>
      <h2>Next steps</h2>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>There is no action necessary for Cloudflare customers, with the exception of remaining SSL for SaaS v1 customers, with whom we are actively working to help migrate. While we move to the final phases of sunsetting v1, Cloudflare for SaaS is now the standard across our platform, and all current and future deployments will use this secure, validated model by default.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As always, thank you to the external researchers for responsibly disclosing this vulnerability. We encourage all of our Cloudflare community to submit any identified vulnerabilities to help us continually improve upon the security posture of our products and platform.</p><p>We also recognize that the trust you place in us is paramount to the success of your infrastructure on Cloudflare. We consider these vulnerabilities with the utmost concern and will continue to do everything in our power to mitigate impact. Although we are confident in our steps to mitigate impact, we recognize the concern that such incidents may induce. We deeply appreciate your continued trust in our platform and remain committed not only to prioritizing security in all we do, but also acting swiftly and transparently whenever an issue does arise.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4W7e9grs33H6l2VfLX03C2</guid>
            <dc:creator>Mia Malden</dc:creator>
            <dc:creator>Albert Pedersen</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>Ross Jacobs</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing new Cloudflare for SaaS documentation]]></title>
            <link>https://blog.cloudflare.com/introducing-new-cloudflare-for-saas-documentation/</link>
            <pubDate>Tue, 09 Aug 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare for SaaS offers a suite of Cloudflare products and add-ons to improve the security, performance, and reliability of SaaS providers. Now, the Cloudflare for SaaS documentation outlines how to optimize it in order to meet your goals ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2i5rqkqFn7HJrwk36od0pM/df3914b54964a9d678cda9ab0fe97968/image3-4.png" />
            
            </figure><p>As a SaaS provider, you’re juggling many challenges while building your application, whether it’s custom domain support, protection from attacks, or maintaining an origin server. In 2021, we were proud to announce <a href="/cloudflare-for-saas/">Cloudflare for SaaS for Everyone</a>, which allows anyone to use Cloudflare to cover those challenges, so they can focus on other aspects of their business. This product has a variety of potential implementations; now, we are excited to announce a new section in our <a href="https://developers.cloudflare.com/">Developer Docs</a> specifically devoted to <a href="https://developers.cloudflare.com/cloudflare-for-saas/">Cloudflare for SaaS documentation</a> to allow you take full advantage of its product suite.</p>
    <div>
      <h3>Cloudflare for SaaS solution</h3>
      <a href="#cloudflare-for-saas-solution">
        
      </a>
    </div>
    <p>You may remember, from our <a href="/cloudflare-for-saas-for-all-now-generally-available/">October 2021 blog post</a>, all the ways that Cloudflare provides solutions for SaaS providers:</p><ul><li><p>Set up an origin server</p></li><li><p>Encrypt your customers’ traffic</p></li><li><p>Keep your customers online</p></li><li><p>Boost the performance of global customers</p></li><li><p>Support custom domains</p></li><li><p>Protect against attacks and bots</p></li><li><p>Scale for growth</p></li><li><p>Provide insights and analytics</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LdxDeVHaUHAy19wdbLfVe/aaec3c62c1616d393a8af6c6daf270d0/image2-5.png" />
            
            </figure><p>However, we received feedback from customers indicating confusion around actually <i>using</i> the capabilities of Cloudflare for SaaS because there are so many features! With the existing documentation, it wasn’t 100% clear how to enhance security and performance, or how to support custom domains. Now, we want to show customers how to use Cloudflare for SaaS to its full potential by including more product integrations in the docs, as opposed to only focusing on the SSL/TLS piece.</p>
    <div>
      <h3>Bridging the gap</h3>
      <a href="#bridging-the-gap">
        
      </a>
    </div>
    <p>Cloudflare for SaaS can be overwhelming with so many possible add-ons and configurations. That’s why the new docs are organized into six main categories, housing a number of new, detailed guides (for example, WAF for SaaS and Regional Services for SaaS):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oI4ffuIoR47X455bljT6c/15422c36a5f9313c1113282577d913f2/image1-12.png" />
            
            </figure><p>Once you get your SaaS application up and running with the <a href="https://developers.cloudflare.com/cloudflare-for-saas/getting-started/">Get Started</a> page, you can find which configurations are best suited to your needs based on your priorities as a provider. Even if you aren’t sure what your goals are, this setup outlines the possibilities much more clearly through a number of new documents and product guides such as:</p><ul><li><p><a href="https://developers.cloudflare.com/cloudflare-for-saas/start/advanced-settings/regional-services-for-saas/">Regional Services for SaaS</a></p></li><li><p><a href="https://developers.cloudflare.com/analytics/graphql-api/tutorials/end-customer-analytics/">Querying HTTP events by hostname with GraphQL</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-for-saas/domain-support/migrating-custom-hostnames/">Migrating custom hostnames</a></p></li></ul><p>Instead of pondering over vague subsection titles, you can peruse with purpose in mind. The advantages and possibilities of Cloudflare for SaaS are highlighted instead of hidden.</p>
    <div>
      <h3>Possible configurations</h3>
      <a href="#possible-configurations">
        
      </a>
    </div>
    <p>This setup facilitates configurations much more easily to meet your goals as a SaaS provider.</p><p>For example, consider performance. Previously, there was no documentation surrounding reduced latency for SaaS providers. Now, the Performance section explains the automatic benefits to your performance by onboarding with Cloudflare for SaaS. Additionally, it offers three options of how to reduce latency even further through brand-new docs:</p><ul><li><p><a href="https://developers.cloudflare.com/cloudflare-for-saas/performance/early-hints-for-saas/">Early Hints for SaaS</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-for-saas/performance/cache-for-saas/">Cache for SaaS</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-for-saas/performance/argo-for-saas/">Argo Smart Routing for SaaS</a></p></li></ul><p>Similarly, the new organization offers <a href="https://developers.cloudflare.com/cloudflare-for-saas/security/waf-for-saas/">WAF for SaaS</a> as a previously hidden security solution, extending providers the ability to enable automatic protection from vulnerabilities and the flexibility to create custom rules. This is conveniently accompanied by a <a href="https://developers.cloudflare.com/cloudflare-for-saas/security/waf-for-saas/managed-rulesets/">step-by-step tutorial using Cloudflare Managed Rulesets</a>.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While this transition represents an improvement in the Cloudflare for SaaS docs, we’re going to expand its accessibility even more. Some tutorials, such as our <a href="https://developers.cloudflare.com/cloudflare-for-saas/security/waf-for-saas/managed-rulesets/">Managed Ruleset Tutorial</a>, are already live within the tile. However, more step-by-step guides for Cloudflare for SaaS products and add-ons will further enable our customers to take full advantage of the available product suite. In particular, keep an eye out for expanding documentation around using Workers for Platforms.</p>
    <div>
      <h3>Check it out</h3>
      <a href="#check-it-out">
        
      </a>
    </div>
    <p>Visit the new <a href="http://www.developers.cloudflare.com/cloudflare-for-saas">Cloudflare for SaaS tile</a> to see the updates. If you are a SaaS provider interested in extending Cloudflare benefits to your customers through Cloudflare for SaaS, visit our <a href="https://www.cloudflare.com/saas/">Cloudflare for SaaS overview</a> and our <a href="https://developers.cloudflare.com/cloudflare-for-saas/plans/">Plans page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Technical Writing]]></category>
            <category><![CDATA[Developer Documentation]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Internship Experience]]></category>
            <guid isPermaLink="false">7cA2oDJgFIx7vyQyTY5Bk8</guid>
            <dc:creator>Mia Malden</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust for SaaS: Deploying mTLS on custom hostnames]]></title>
            <link>https://blog.cloudflare.com/zero-trust-for-saas-deploying-mtls-on-custom-hostnames/</link>
            <pubDate>Tue, 22 Mar 2022 12:58:25 GMT</pubDate>
            <description><![CDATA[ SaaS providers can now enable mutual TLS authentication on their customer’s domains through our Access product ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare has a large base of Software-as-a-Service (SaaS) customers who manage thousands or millions of their customers’ domains that use their SaaS service. We have helped those SaaS providers grow by extending our infrastructure and services to their customer’s domains through a product called <a href="/cloudflare-for-saas/">Cloudflare for SaaS</a>. Today, we’re excited to give our SaaS providers a new tool that will help their customers add an extra layer of security: they can now enable mutual TLS authentication on their customer’s domains through our Access product.</p>
    <div>
      <h3>Primer on Mutual TLS</h3>
      <a href="#primer-on-mutual-tls">
        
      </a>
    </div>
    <p>When you connect to a website, you should see a lock icon in the address bar — that’s your browser telling you that you’re connecting to a website over a secure connection and that the website has a valid public TLS certificate. <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificates</a> keep Internet traffic encrypted using a public/private key pair to encrypt and decrypt traffic. They also provide authentication, proving to clients that they are connecting to the correct server.</p><p>To make a secure connection, a <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">TLS handshake</a> needs to take place. During the handshake, the client and the server exchange cryptographic keys, the client authenticates the identity of the server, and both the client and the server generate session keys that are later used to encrypt traffic.</p><p>A TLS handshake looks like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MaiC18jwmeIKkUabottxd/1be850baf8137a768e76401e483c2a23/image1-102.png" />
            
            </figure><p>In a TLS handshake, the client always validates the certificate that is served by the server to make sure that it's sending requests to the right destination. In the same way that the client needs to authenticate the identity of the server, sometimes the server needs to authenticate the client — to ensure that only authorized clients are sending requests to the server.</p><p>Let’s say that you’re managing a few services: service A writes information to a database. This database is absolutely crucial and should only have entries submitted by service A. Now, what if you have a bug in your system and service B accidentally makes a write call to the database?</p><p>You need something that checks whether a service is authorized to make calls to your database — like a bouncer. A bouncer has a VIP list — they can check people’s IDs against the list to see whether they’re allowed to enter a venue. Servers can use a similar model, one that uses TLS certificates as a form of ID.</p><p>In the same way that a bouncer has a VIP list, a server can have a Certificate Authority (CA) Root from which they issue certificates. Certificates issued from the CA Root are then provisioned onto clients. These client certificates can then be used to identify and authorize the client. As long as a client presents a valid certificate — one that the server can validate against the Root CA, it's allowed to make requests. If a client doesn’t present a client certificate (isn’t on the VIP list) or presents an unauthorized client certificate, then the server can choose to reject the request. This process of validating client <i>and</i> server certificates is called <a href="https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/">mutual TLS authentication</a> (mTLS) and is done during the TLS handshake.</p><p>When mTLS isn’t used, only the server is responsible for presenting a certificate, which the client verifies. With mTLS, both the client and the server present and validate one another’s certificates, pictured below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qRrMeIBvIWAKu8hDGxGhF/75113cc0c743f6663da8216725b02da2/-jX-m0--vJzKCpz9UhlbWZNvl8hJDGoACckkNp0bAIdKGWk1Zr_k4R6gQqNBybVqbkkT8X9bopBZFsDa04iHJzkohQ4pMchvaEMV0secN2DR8pB4OX63Ysd-y6sw.png" />
            
            </figure>
    <div>
      <h3>mTLS + Access = Zero Trust</h3>
      <a href="#mtls-access-zero-trust">
        
      </a>
    </div>
    <p>A few years ago, we added mTLS support to our <a href="https://developers.cloudflare.com/cloudflare-one/">Access</a> product, allowing customers to enable a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> policy on their applications. Access customers can deploy a policy that dictates that all clients must present a valid certificate when making a request. That means that requests made without a valid certificate — usually from unauthorized clients — will be blocked, adding an extra layer of protection. Cloudflare has allowed customers to configure mTLS on their Cloudflare domains by setting up Access policies. The only caveat was that to use this feature, you had to be the owner of the domain. Now, what if you’re not the owner of a domain, but you do manage that domain’s origin? This is the case for a large base of our customers, the SaaS providers that extend their services to their customers’ domains that they do not own.</p>
    <div>
      <h3>Extending Cloudflare benefits through SaaS providers</h3>
      <a href="#extending-cloudflare-benefits-through-saas-providers">
        
      </a>
    </div>
    <p><a href="/cloudflare-for-saas/">Cloudflare for SaaS</a> enables SaaS providers to extend the benefits of the Cloudflare network to their customers’ domains. These domains are not owned by the SaaS provider, but they do use the SaaS provider’s service, routing traffic back to the SaaS provider’s origin.</p><p>By doing this, SaaS providers take on the responsibility of providing their customers with the highest uptime, lightning fast performance, and unparalleled security — something they can easily extend to their customers through Cloudflare.</p><p>Cloudflare for SaaS actually started out as <a href="/introducing-ssl-for-saas/">SSL for SaaS</a>. We built <a href="https://www.cloudflare.com/application-services/products/ssl-for-saas-providers/">SSL for SaaS</a> to give SaaS providers the ability to issue TLS certificates for their customers, keeping the SaaS provider’s customers safe and secure.</p><p>Since then, our SaaS customers have come to us with a new request: extend the mTLS support that we built out for our direct customers, but to their customers.</p>
    <div>
      <h3>Why would SaaS providers want to use mTLS?</h3>
      <a href="#why-would-saas-providers-want-to-use-mtls">
        
      </a>
    </div>
    <p>As a SaaS provider, there’s a wide range of services that you can provide. Some of these services require higher security controls than others.</p><p>Let’s say that the SaaS solution that you’re building is a payment processor. Each customer gets its own API endpoint that their users send requests to, for example, <i>pay.&lt;business_name&gt;.com.</i> As a payment processor, you don’t want any client or device to make requests to your service, instead you only want authorized devices to do so — mTLS does exactly that.</p><p>As the SaaS provider, you can configure a Root CA for each of your customers’ API endpoints. Then, have each Root CA issue client certificates that will be installed on authorized devices. Once the client certificates have been installed, all that is left is enforcing a check for valid certificates.</p><p>To recap, by doing this, as a SaaS provider, your customers can now ensure that requests bound for their payment processing API endpoint only come from valid devices. In addition, by deploying individual Root CAs for each customer, you also prevent clients that are authorized to make requests to one customers’ API endpoint from making requests to another customers’ API endpoint when they are not authorized to do so.</p>
    <div>
      <h3>How can you set this up with Cloudflare?</h3>
      <a href="#how-can-you-set-this-up-with-cloudflare">
        
      </a>
    </div>
    <p>As a SaaS provider, <a href="https://developers.cloudflare.com/ssl/ssl-for-saas/getting-started">configure Cloudflare for SaaS</a> and add your customer’s domains as Custom Hostnames. Then, in the Cloudflare for Teams dashboard, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/mutual-tls-authentication/#add-mtls-authentication-to-your-access-configuration">add mTLS authentication</a> with a few clicks.</p><p>This feature is currently in Beta and is available for Enterprise customers to use. If you have any feedback, please let your Account Team know.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">3aHjcxH6Lwz12aanaYGfS1</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare acquires Vectrix to expand Zero Trust SaaS security]]></title>
            <link>https://blog.cloudflare.com/cloudflare-acquires-vectrix-to-expand-zero-trust-saas-security/</link>
            <pubDate>Thu, 10 Feb 2022 21:19:31 GMT</pubDate>
            <description><![CDATA[ We are excited to share that Vectrix has been acquired by Cloudflare! 
Vectrix helps IT and security teams detect security issues across their SaaS applications ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2dOkY5QDJfM6IXw2bL6gtT/e4c8f799e885d0bca83e75cdb50f78ae/image2-10.png" />
            
            </figure><p>We are excited to share that Vectrix has been acquired by Cloudflare!</p><p>Vectrix helps IT and security teams detect security issues across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.</p><p>We built Vectrix to solve a problem that terrified us as security engineers ourselves: how do we know if the SaaS apps we use have the right controls in place? Is our company data protected? SaaS tools make it easy to work with data and collaborate across organizations of any size, but that also makes them vulnerable.</p>
    <div>
      <h3>The growing SaaS security problem</h3>
      <a href="#the-growing-saas-security-problem">
        
      </a>
    </div>
    <p>The past two years have accelerated SaaS adoption much faster than any of us could have imagined and without much input on how to secure this new business stack.</p><p>Google Workspace for collaboration. Microsoft Teams for communication. Workday for HR. Salesforce for customer relationship management. The list goes on.</p><p>With this new reliance on SaaS, IT and security teams are faced with a new set of problems like files and folders being made public on the Internet, external users joining private chat channels, or an employee downloading all customer data from customer relationship tools.</p><p>The challenge of securing users and data across even a handful of applications, each with its own set of security risks and a unique way of protecting it, is overwhelming for most IT and security teams. Where should they begin?</p>
    <div>
      <h3>One platform, many solutions</h3>
      <a href="#one-platform-many-solutions">
        
      </a>
    </div>
    <p>Enter the API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a>. We think about an API-driven CASB as a solution that can scan, detect, and continuously monitor for security issues across organization-approved, IT-managed SaaS apps like Microsoft 365, ServiceNow, Zoom, or Okta.</p><p>CASB solutions help teams with:</p><ul><li><p><b>Data security</b> - ensuring the wrong file or folder is not shared publicly in Dropbox.</p></li><li><p><b>User activity</b> - alerting to suspicious user permissions changing in Workday at 2:00 AM.</p></li><li><p><b>Misconfigurations</b> - keeping Zoom Recordings from becoming publicly accessible.</p></li><li><p><b>Compliance</b> - tracking and reporting who modified Bitbucket branch permissions.</p></li><li><p><b>Shadow IT</b> - detecting users that signed up for an unapproved app with their work email.</p></li></ul><p><a href="https://www.cloudflare.com/application-services/solutions/">Securing SaaS applications</a> starts with visibility into what users and data reside in a service, and then understanding how they’re used. From there, protective and preventive measures, within the SaaS application and on the network, can be used to ensure data stays safe.</p><p>It’s not always the extremely complex things either. A really good example of this came from an early Vectrix customer who asked if we could detect public Google Calendars for them. They recently had an issue where someone on the team had shared their calendar which contained several sensitive meeting links and passcodes. They would have saved themselves a headache if they could have detected this prior, and even better, been able to correct it in a few clicks.</p><p>In this SaaS age something as innocent as a calendar invite can introduce risks that IT and security teams now have to think about. This is why we’re excited to grow further at Cloudflare, helping more teams stay one step ahead.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/N1DZNQ3B5Av5h94AmYCyZ/158720e015e7ecdfaa6321f87465d84f/image3-14.png" />
            
            </figure>
    <div>
      <h3>Ridiculously easy setup</h3>
      <a href="#ridiculously-easy-setup">
        
      </a>
    </div>
    <p>A core component of an API-first approach is the access system, which powers integrations via an OAuth 2.0 or vendor marketplace app to authorize secure API access into SaaS services. This means the API-driven CASB works out of band, or not in the direct network path, and won’t cause any network slowdowns or require any network configuration changes.</p><p>In just a few clicks, you can securely integrate with SaaS apps from anywhere—no agents, no installs, no downloads.</p><p>Over a cup of coffee an IT or security system administrator can connect their company's critical SaaS apps and start getting visibility into data and user activity right away. In fact, we usually see no more than 15 minutes pass from creating an account to the first findings being reported.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uHxEUxm4HmZl5rWnVF1Fu/d64adb38cb72d1d612fea57b09419346/image1-11.png" />
            
            </figure>
    <div>
      <h3>The more, the merrier</h3>
      <a href="#the-more-the-merrier">
        
      </a>
    </div>
    <p>By integrating with more and more organization-approved SaaS application patterns that may otherwise not be visible start to emerge.</p><p>For example, being alerted that Sam attempted to disable two-factor authentication in multiple SaaS applications may indicate a need for more security awareness training. Or being able to detect numerous users granting sensitive account permissions to an unapproved third-party app could indicate a possible phishing attempt.</p><p>The more integrations you protect the better your overall SaaS security becomes.</p>
    <div>
      <h3>Better together in Zero Trust</h3>
      <a href="#better-together-in-zero-trust">
        
      </a>
    </div>
    <p>The entire Vectrix team has joined Cloudflare and will be integrating API-driven CASB functionality into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a>, launching later this year.</p><p>This means an already impressive set of growing products like <a href="https://www.cloudflare.com/teams/access/">Access (ZTNA)</a>, <a href="https://www.cloudflare.com/teams/gateway/">Gateway (SWG)</a>, and <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>, will be getting even better, together. Even more exciting though, is that using all of these services will be a seamless experience, managed from a unified <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust platform</a> and dashboard.</p><p>A few examples of what we’re looking forward to growing together are:</p><ul><li><p><b>Shadow IT:</b> use <a href="https://www.cloudflare.com/teams/gateway/">Gateway</a> to detect all your SaaS apps in use, block those that are unapproved, and use CASB to ensure your data stays safe in sanctioned ones.</p></li><li><p><b>Secure access</b>: use <a href="https://www.cloudflare.com/teams/access/">Access</a> to ensure only users who match your device policies will be allowed into SaaS apps and CASB to ensure the SaaS app stays configured only for your approved authentication method.</p></li><li><p><b>Data control</b>: use <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>’s input controls to prevent users from copy/pasting or printing data and CASB to ensure the data isn’t modified to be shared publicly from within the SaaS app itself for total control.</p></li></ul>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Vectrix will be integrated into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a> to extend the security of Cloudflare’s global network to the data stored in SaaS applications from a single control plane.</p><p>If you’d like early beta access, <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta">please click here to join the waitlist</a>. We will send invites out in the sign-up order we received them. You can learn more about the acquisition <a href="/cloudflare-zero-trust-casb/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">12fnt5xyJTCWx4Jjs0OpDA</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare for SaaS for All, now Generally Available!]]></title>
            <link>https://blog.cloudflare.com/cloudflare-for-saas-for-all-now-generally-available/</link>
            <pubDate>Fri, 22 Oct 2021 15:31:00 GMT</pubDate>
            <description><![CDATA[ We are very excited to announce that Cloudflare for SaaS is generally available, so that every customer, big and small, can use Cloudflare for SaaS to continue scaling and building their SaaS business.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>During Developer Week a few months ago, we opened up the <a href="/cloudflare-for-saas/">Beta for Cloudflare for SaaS</a>: a one-stop shop for SaaS providers looking to provide fast load times, unparalleled redundancy, and the strongest security to their customers.</p><p>Since then, we’ve seen numerous developers integrate with our technology, allowing them to spend their time building out their solution instead of focusing on the burdens of running a fast, secure, and scalable infrastructure — after all, that’s what we’re here for.</p><p>Today, we are very excited to announce that Cloudflare for SaaS is generally available, so that every customer, big and small, can use Cloudflare for SaaS to continue scaling and building their SaaS business.</p>
    <div>
      <h2>What is Cloudflare for SaaS?</h2>
      <a href="#what-is-cloudflare-for-saas">
        
      </a>
    </div>
    <p>If you’re running a SaaS company, you have customers that are fully reliant on you for your service. That means you’re responsible for keeping their domain fast, secure, and protected. But this isn’t simple. There’s a long checklist you need to get through to put a solution in your customers’ hands:</p><ul><li><p>Set up an origin server</p></li><li><p>Encrypt your customers’ traffic</p></li><li><p>Keep your customers online</p></li><li><p>Boost the performance of global customers</p></li><li><p>Support vanity domains</p></li><li><p>Protect against attacks and bots</p></li><li><p>Scale for growth</p></li><li><p>Provide insights and analytics       </p></li></ul><p>And on top of that, you need to also focus on building out your solution and your business. As a developer or startup with limited resources, this can delay your product launch by weeks or months.</p><p>That’s what we’re here to help with! We have numerous engineering teams whose sole focus is to work on products that take care of each one of these tasks, so you don’t have to!</p><p>The Cloudflare solution:</p><ul><li><p>Set up an origin server  → Workers</p></li><li><p>Encrypt your customers’ traffic →  <a href="https://www.cloudflare.com/application-services/products/ssl-for-saas-providers/">SSL for SaaS</a></p></li><li><p>Keep your customers online → Cloudflare’s global Anycast network</p></li><li><p>Boost the performance of global customers → Argo Smart Routing/Cache</p></li><li><p>Support vanity domains → Custom Hostnames</p></li><li><p>Protect against attacks and bots → WAF and Bot Management</p></li><li><p>Scale for growth → Workers</p></li><li><p>Provide insights and analytics → Custom Hostname Analytics</p></li></ul>
    <div>
      <h2>Pricing, Made for Developers</h2>
      <a href="#pricing-made-for-developers">
        
      </a>
    </div>
    <p>Starting today, Cloudflare for SaaS is available to purchase on Free, Pro, and Business plans. We wanted to make sure that the pricing made sense for developers. At the time of building, you don’t know how many customers you’ll have, so we wanted to offer flexibility by keeping the pricing as simple as possible: only pay for the customers you use.</p><p>Each customer domain using the service is called a Custom Hostname. For each Custom Hostname, we automatically provision a <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificate</a>. But not just that!  Beyond the TLS certificate, each of your Custom Hostnames inherits the full suite of Cloudflare products that you set up on your SaaS zone. From Bot Management to Argo Smart Routing, you can extend these add-ons that protect and accelerate your domain to your customers.</p><p>Custom Hostnames cost two dollars per month. We will only charge you after each Custom Hostname has been onboarded, adjusted according to when you created it. That means that if you created 10 Custom Hostnames at the start of the month and 10 Custom Hostnames halfway through, at the end of the month you will be billed $30.</p><p>This way, you’re only charged for the Custom Hostnames that you provision. It’s also a great incentive to make sure you clean up after your churned customers.</p><p>If you’re an Enterprise customer and want to learn more about the benefits that you can get from Cloudflare for SaaS, make sure you check out our <a href="/whats-new-with-cloudflare-for-saas/">blog post</a> about the latest developments.</p>
    <div>
      <h2>Show us what you’re building!</h2>
      <a href="#show-us-what-youre-building">
        
      </a>
    </div>
    <p>During the beta alone, we’ve seen incredible projects built out on the platform. We wanted to showcase these developers to show you what’s possible. And even better, some of these have been built on our Workers platform! We’d love to see what you’re working on. Join our <a href="https://discord.gg/rAYkEcFW7v">Discord channel</a> and showcase your work! Have feature requests for us? Let us know!</p>
    <div>
      <h4>mmm.page: Simple Personal Websites</h4>
      <a href="#mmm-page-simple-personal-websites">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AqlTSiU00nyngatIgkzmX/d35b9b9c595b0841c143d2344da91c11/5.12.21_hero_main.gif" />
            
            </figure><p><a href="https://mmm.page/">mmm.page</a> is a drag-and-drop website builder that makes it dead simple to create auto-responsive, collage-like websites: websites with overlapping text, images, GIFs, YouTube videos, Spotify embeds, and (a lot) more. To make it easier, all the standard website tedium — uptime, usability, performance, reliability, responsiveness, SEO, etc. — are handled under the hood so all you have to worry about is adding content and arranging it how you want.</p><p>Under <i>their</i> hood is Cloudflare. Cloudflare’s CDN allows both the flexibility of server-side pages as well as the instant loading times of static pages — not to mention an 80% reduction in server costs. Custom Hostnames alone saved months of development time by handling <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> and <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">SSL management</a> (which are otherwise tricky to get perfect and reliable).</p><p>They’ve used Workers for increasingly more tasks that would’ve otherwise taken an order of magnitude more time if implemented with their current backend monolith — the ease of deployment and comparatively low cost of Workers is something that keeps them coming back.</p><p>The longer-term hope is for pages to be used as a sort of beacon signal, an easy-to-make yet unbounded way to express to others the things you’re interested in, especially for things that aren’t so easily describable or captured in words. They look forward to a world of a ton more DIY micro-sites. Cloudflare has been crucial in taking care of much of the difficult technical plumbing and giving them more time to work on designs and features that get them closer to this hope.</p>
    <div>
      <h4>Lightfunnels</h4>
      <a href="#lightfunnels">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5XZTAhBsMbF32cEa88ywTy/76e27d52c2ec641ca96f5be485aef3df/Screen-Shot-2021-10-22-at-8.25.51-AM.png" />
            
            </figure><p><a href="https://lightfunnels.com">Lightfunnels</a> is a performance driven e-commerce and lead generation platform. It focuses on delivering fast, reliable, and highly converting sales funnels to its users and their customers.</p><p>With Cloudflare for SaaS, Lightfunnels allows users to preserve their brand by easily connecting their own domain names with SSL to use on their funnels.</p><p>The platform handles large e-commerce traffic volume through Cloudflare Workers. This helps Lightfunnels serve pages from the closest edge to the customer, wherever they are in the world, allowing for blazing fast page load speeds.</p><p>Workers also come with a powerful caching API that eliminates a great percentage of back-end trips and reduces the stress on their servers.</p><blockquote><p><i>“Our aim is to build the best performing e-commerce and lead generation platform on the market. Page load speeds play a significant role in performance. Using Cloudflare for SaaS along with Cloudflare Workers made building a reliable, secure, and fast infrastructure a breeze.”</i>- <b>Yassir Ennazk,</b> Co-founder &amp; CEO at Lightfunnels</p></blockquote>
    <div>
      <h4>Ventrata</h4>
      <a href="#ventrata">
        
      </a>
    </div>
    <p><a href="https://ventrata.com/">Ventrata</a> is a SaaS multi-channel booking platform for large attractions and tour operators. They power booking sites and B2B booking portals for clients that run on other domains. Cloudflare for SaaS has allowed them to leverage all of Cloudflare’s tools, including Firewall, image caching, Workers, and free TLS certificates on Custom Hostnames, while allowing their clients to keep full control of their brand. Their implementation involved just 4 lines of code without any infrastructure/DevOps help required, which would have been impossible before.</p>
    <div>
      <h3>Currently a part of the Beta?</h3>
      <a href="#currently-a-part-of-the-beta">
        
      </a>
    </div>
    <p>If you were accepted as a part of the Cloudflare for SaaS Beta, you will get a notice next week about migrating to the paid version.  </p>
    <div>
      <h2>Help build a better Internet</h2>
      <a href="#help-build-a-better-internet">
        
      </a>
    </div>
    <p>Want to be a part of the Cloudflare team and work on the products that power Cloudflare for SaaS? <a href="https://www.cloudflare.com/careers/">We’re hiring!</a></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[TLS]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">YiAq6zpyI6grxaDcKR0VD</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing: Custom Hostname Analytics]]></title>
            <link>https://blog.cloudflare.com/introducing-custom-hostname-analytics/</link>
            <pubDate>Wed, 08 Sep 2021 12:58:09 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that SaaS providers will now be able to give their customers visibility into what happens to their traffic when the customer onboards onto the SaaS provider, and inherently, onto the Cloudflare network.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6cEO0ostaF8q9DXzBNVlb4/db8b0cb0f1e8c91869891c4a7d90489b/image5-2.png" />
            
            </figure><p>In our <a href="/whats-new-with-cloudflare-for-saas/">last blog</a>, we talked about how Cloudflare can help SaaS providers extend the benefits of our network to their customers. Today, we’re excited to announce that SaaS providers will now be able to give their customers visibility into what happens to their traffic when the customer onboards onto the SaaS provider, and inherently, onto the Cloudflare network.</p><p>As a SaaS provider, you want to see the analytics about the traffic bound for your service. Use it to see the global distribution of your customers, or to measure the success of your business. In addition to that, you want to provide the same insights to your individual customers. That’s exactly what Custom Hostname Analytics allows you to do!</p>
    <div>
      <h3>The SaaS Setup</h3>
      <a href="#the-saas-setup">
        
      </a>
    </div>
    <p>Imagine you run a SaaS service for burrito shops, called The Burrito Bot. You have your burrito service set up on <i>shop.theburritobot.com</i> and your customers can use your service either through a subdomain of your zone, i.e. <i>dina.theburritobot.com</i>, or through their own website e.g. <i>burrito.example.com</i>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/75dnr15da191peAZiA4NIE/3332935651231b64a8a1c48b81d766fb/image4-1.png" />
            
            </figure><p>When customers onboard to your burrito service, they become fully reliant on you to provide their website with the fastest load time, the best protection, and the highest uptime. Similarly, when SaaS providers onboard to Cloudflare, they expect the same — and we deliver. The easiest way that we show this to our customers is through analytics. We put ourselves in front of their website, blocking attacks and accelerating traffic. Then, through dashboards like Bot Analytics or Cache Analytics, we show insights about bad bots and low latency in real time.</p><p>In the same way that it’s our responsibility to show SaaS providers all the benefits we’re providing for their traffic, we think SaaS providers should be able to provide the same information to their customers.</p>
    <div>
      <h3>Analytics for the SaaS Provider</h3>
      <a href="#analytics-for-the-saas-provider">
        
      </a>
    </div>
    <p>As a SaaS provider, your infrastructure is your customers’ infrastructure, so you need to have visibility into the traffic of your service to be able to make business decisions. Being able to answer questions like “how many total requests am I getting on my service?”, “Which customer is transferring the most data?”, or “How many global customers do I have?” can help you figure out how to bill your customers or how and where to scale your infrastructure. With custom hostname analytics, you can get the full view of how customers are using your services through our Dashboard or API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4t3fPHOBiK9IK1DdwMPCB1/5eefb482a5cf9fe197889ebaa73017f4/image1-1.png" />
            
            </figure><p>Here you can see that one custom hostname is using significantly more data transfer than the others, and you might want to charge them accordingly. Alternatively, you can look at the geographic breakdown of your customers. If it looks like burrito shops are growing in Europe, you might want to think about expanding your business there and adding new origins to serve that traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MccHYXHLaorB2Boif6UxN/4b59be0064f6682c48a4defe6efb609a/image3-1.png" />
            
            </figure>
    <div>
      <h3>Analytics for your customers</h3>
      <a href="#analytics-for-your-customers">
        
      </a>
    </div>
    <p>In the same way that you want to see the breakdown of traffic bound for your service, your customers want to see the same information about their website.  They want to know how many page views they're getting, if they’re having any bots ordering fake burritos, or how fast their website is. With custom hostname analytics, we’re giving SaaS providers the resources they need to present this data to their customers.</p>
    <div>
      <h3>Build your own dashboards!</h3>
      <a href="#build-your-own-dashboards">
        
      </a>
    </div>
    <p>The most powerful way to use our technology would be to use our <a href="https://developers.cloudflare.com/analytics/graphql-api/">GraphQL Analytics API</a> with the <i>clientRequestHTTPHost</i> field to get analytics for each of your customers’ domains. This will allow you to build your own dashboards and display the information that you feel is important to your customers.</p>
    <div>
      <h3>Show your customer the bad traffic you’re blocking</h3>
      <a href="#show-your-customer-the-bad-traffic-youre-blocking">
        
      </a>
    </div>
    <p>Let’s say you’re using Cloudflare for SaaS and are extending Bot Management to your thousands of customers — wouldn’t you want to show them how much malicious traffic you’re keeping away from them?</p>
    <div>
      <h3>You can do that!</h3>
      <a href="#you-can-do-that">
        
      </a>
    </div>
    <p>One way to see the analytics for your custom hostnames is in the Dashboard. You can either look up the total requests for an individual hostname or — by adding the filter <i>Host does not equal theburritobot.com</i> — total requests for all your custom hostnames.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/223fPfMiZx85t5QKoJkNUL/2dc02127430fd3519fc7545ae266dfe7/image2-2.png" />
            
            </figure>
    <div>
      <h3>What else can I see?</h3>
      <a href="#what-else-can-i-see">
        
      </a>
    </div>
    <p>You can use Custom Hostname analytics for just about everything that you can see for your own domain. From your firewall to bot protection, you can use <a href="https://developers.cloudflare.com/analytics/graphql-api/features/data-sets">any dataset</a> with a <i>clientRequestHTTPHost</i> field for your custom hostname analytics.</p>
    <div>
      <h3>Interested in trying this out?</h3>
      <a href="#interested-in-trying-this-out">
        
      </a>
    </div>
    <p><a href="https://forms.gle/Kt9piA3XS6BskdpB9">Sign up for our Cloudflare for SaaS Beta</a>. We are continuing to accept applicants and are excited to announce that General Availability is not too far away.</p>
    <div>
      <h3>Share what you build</h3>
      <a href="#share-what-you-build">
        
      </a>
    </div>
    <p>We’d love to see what kind of dashboards you build with our Analytics API. If you want to share what you’ve built, tweet at @Cloudflare and send us a screenshot!</p> ]]></content:encoded>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <guid isPermaLink="false">6mXF8MfGLuH7NPybw8C0Ot</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s new with Cloudflare for SaaS?]]></title>
            <link>https://blog.cloudflare.com/whats-new-with-cloudflare-for-saas/</link>
            <pubDate>Tue, 07 Sep 2021 12:57:06 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce all the customizations that our team has been working on for our Enterprise customers — for both Cloudflare for SaaS and SSL for SaaS. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VqLLgTYGePE0S09caFIqn/e36ed55fb383de7a0bfd8763d4336828/image2-1.png" />
            
            </figure><p><a href="/cloudflare-for-saas/">This past April</a>, we announced the Cloudflare for SaaS Beta which makes our SSL for SaaS product available to everyone. This allows any customer — from first-time developers to large enterprises — to use Cloudflare for SaaS to extend our full product suite to their own customers. SSL for SaaS is the subset of Cloudflare for SaaS features that focus on a customer’s Public Key Infrastructure (PKI) needs.</p><p>Today, we’re excited to announce all the customizations that our team has been working on for our Enterprise customers — for both Cloudflare for SaaS and SSL for SaaS.</p>
    <div>
      <h3>Let’s start with the basics — the common SaaS setup</h3>
      <a href="#lets-start-with-the-basics-the-common-saas-setup">
        
      </a>
    </div>
    <p>If you’re running a SaaS company, your solution might exist as a subdomain of your SaaS website, e.g. template.&lt;<i>mysaas&gt;</i>.com, but ideally, your solution would allow the customer to use their own vanity hostname for it, such as example.com.</p><p>The most common way to begin using a SaaS company’s service is to point a CNAME DNS record to the subdomain that the SaaS provider has created for your application. This ensures traffic gets to the right place, and it allows the SaaS provider to make infrastructure changes without involving your end customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1e65t2gMZxa81OVQ04OhHb/69605839a139551e01feca1b7c52a55d/image4.png" />
            
            </figure><p>We kept this in mind when we built our SSL for SaaS a few years ago. SSL for SaaS takes away the burden of certificate issuance and management from the SaaS provider by proxying traffic through Cloudflare’s edge. All the SaaS provider needs to do is onboard their zone to Cloudflare and ask their end customers to create a CNAME to the SaaS zone — something they were already doing.</p><p>The big benefit of giving your customers a CNAME record (instead of a fixed IP address) is that it gives you, the SaaS provider, more flexibility and control. It allows you to seamlessly change the IP address of your server in the background. For example, if your IP gets blocked by ISP providers, you can update that address on your customers’ behalf with a CNAME record. With a fixed A record, you rely on each of your customers to make a change.</p><p>While the CNAME record works great for most customers, some came back and wanted to bypass the limitation that CNAME records present. RFC 1912 states that CNAME records cannot coexist with other DNS records, so in most cases, you cannot have a CNAME at the root of your domain, e.g. example.com. Instead, the CNAME needs to exist at the subdomain level, i.e. <a href="http://www.example.com">www.example.com</a>. Some DNS providers (including Cloudflare) bypass this restriction through a method called <a href="/introducing-cname-flattening-rfc-compliant-cnames-at-a-domains-root/">CNAME flattening</a>.</p><p>Since SaaS providers have no control over the DNS provider that their customers are using, the feedback they got from their customers was that they wanted to use the apex of their zone and not the subdomain. So when our SaaS customers came back asking us for a solution, we delivered. We call it Apex Proxying.</p>
    <div>
      <h3>Apex Proxying</h3>
      <a href="#apex-proxying">
        
      </a>
    </div>
    <p>For our SaaS customers who want to allow their customers to proxy their apex to their zone, regardless of which DNS provider they are using, we give them the option of Apex Proxying. Apex Proxying is an SSL for SaaS feature that gives SaaS providers a pair of IP addresses to provide to their customers when CNAME records do not work for them.</p><p>Cloudflare starts by allocating a dedicated set of IPs for the SaaS provider. The SaaS provider then gives their customers these IPs that they can add as A or AAAA DNS records, allowing them to proxy traffic directly from the apex of their zone.</p><p>While this works for most, some of our customers want more flexibility. They want to have multiple IPs that they can change, or they want to assign different sets of customers to different buckets of IPs. For those customers, we give them the option to bring their own IP range, so they control the IP allocation for their application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bZIm6ydNUeN8pbEhNnzlW/27bb817711720689ce6ac6c1c2b03f43/image1.png" />
            
            </figure>
    <div>
      <h3>Bring Your Own IPs</h3>
      <a href="#bring-your-own-ips">
        
      </a>
    </div>
    <p>Last year, we announced <a href="/bringing-your-own-ips-to-cloudflare-byoip/">Bring Your Own IP</a> (BYOIP), which allows customers to bring their own IP range for Cloudflare to announce at our edge. One of the benefits of BYOIP is that it allows SaaS customers to allocate that range to their account and then, instead of having a few IPs that their customers can point to, they can distribute all the IPs in their range.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Tt3UYXZalgTeHkO274O1i/58b3e5d51c6e1d400e223b3c23319878/image3.png" />
            
            </figure><p>SaaS customers often require granular control of how their IPs are allocated to different zones that belong to different customers. With 256 IPs to use, you have the flexibility to either group customers together or to give them dedicated IPs. It’s up to you!</p><p>While we’re on the topic of grouping customers, let’s talk about how you might want to do this when sending traffic to your origin.</p>
    <div>
      <h3>Custom Origin Support</h3>
      <a href="#custom-origin-support">
        
      </a>
    </div>
    <p>When setting up Cloudflare for SaaS, you indicate your fallback origin, which defines the origin that all of your Custom Hostnames are routed to. This origin can be defined by an IP address or point to a load balancer defined in the zone. However, you might not want to route all customers to the same origin. Instead, you want to route different customers (or custom hostnames) to different origins — either because you want to group customers together or to help you scale the origins supporting your application.</p><p>Our Enterprise customers can now choose a custom origin that is not the default fallback origin for any of their Custom Hostnames. Traditionally, this has been done by emailing your account manager and requesting custom logic at Cloudflare's edge, a very cumbersome and outdated practice. But now, customers can easily indicate this in the UI or in their <a href="https://api.cloudflare.com/#custom-hostname-for-a-zone-properties">API requests.</a></p>
    <div>
      <h3>Wildcard Support</h3>
      <a href="#wildcard-support">
        
      </a>
    </div>
    <p>Oftentimes, SaaS providers have customers that don’t just want their domain to stay protected and encrypted, but also the subdomains that fall under it.</p><p>We wanted to give our Enterprise customers the flexibility to extend this benefit to their end customers by offering wildcard support for <a href="https://developers.cloudflare.com/ssl/ssl-for-saas">Custom Hostnames</a>.</p><p>Wildcard Custom Hostnames extend the Custom Hostname’s configuration from a specific hostname — e.g. “blog.example.com” — to the next level of subdomains of that hostname, e.g. “*.blog.example.com”.</p><p>To create a Custom Hostname with a wildcard, you can either indicate <b>Enable wildcard support</b> when creating a Custom Hostname in the Cloudflare dashboard or when you’re creating a Custom Hostname <a href="https://api.cloudflare.com/#custom-hostname-for-a-zone-create-custom-hostname">through the API</a>, indicate wildcard: “true”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Y7NGTSMfEDIQU0c1lmamk/4a36f05ef3b828febad17945c0d8f045/image5.png" />
            
            </figure><p>Now let’s switch gears to <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificate management</a> and the improvements our team has been working on.</p>
    <div>
      <h3>TLS Management for All</h3>
      <a href="#tls-management-for-all">
        
      </a>
    </div>
    <p>SSL for SaaS was built to <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">reduce the burden of certificate management</a> for SaaS providers. The initial functionality was meant to serve most customers and their need to issue, maintain, and renew certificates on their customers’ behalf. But one size does not fit all, and some of our customers have more specific needs for their certificate management — and we want to make sure we accommodate them.</p>
    <div>
      <h3>CSR Support/Custom certs</h3>
      <a href="#csr-support-custom-certs">
        
      </a>
    </div>
    <p>One of the superpowers of <a href="https://www.cloudflare.com/application-services/products/ssl-for-saas-providers/">SSL for SaaS</a> is that it allows Cloudflare to manage all the certificate issuance and renewals on behalf of our customers and their customers. However, some customers want to allow their end customers to upload their own certificates.</p><p>For example, a bank may only trust certain certificate authorities (CAs) for their certificate issuance. Alternatively, the SaaS provider may have initially built out TLS support for their customers and now their customers expect that functionality to be available. Regardless of the reasoning, we have given our customers a few options that satisfy these requirements.</p><p>For customers who want to maintain control over their TLS private keys or give their customers the flexibility to use their certification authority (CA) of choice, we allow the SaaS provider to upload their customer’s certificate.</p><p>If you are a SaaS provider and one of your customers does not allow third parties to generate keys on their behalf, then you want to allow that customer to <a href="https://developers.cloudflare.com/ssl/ssl-for-saas/uploading-certificates">upload their own certificate</a>. Cloudflare allows SaaS providers to upload their customers’ certificates to any of their custom hostnames — in just one API call!</p><p>Some SaaS providers never want a person to see private key material, but want to be able to use the CA of their choice. They can do so by generating a <a href="https://developers.cloudflare.com/ssl/ssl-for-saas/certificate-signing-requests">Certificate Signing Request (CSR)</a> for their Custom Hostnames, and then either use those CSRs themselves to order certificates for their customers or relay the CSRs to their customers so that they can provision their own certificates. In either case, the SaaS provider is able to then upload the certificate for the Custom Hostname after the certificate has been issued from their customer’s CA for use at Cloudflare’s edge.</p>
    <div>
      <h3>Custom Metadata</h3>
      <a href="#custom-metadata">
        
      </a>
    </div>
    <p>For our customers who need to customize their configuration to handle specific rules for their customer’s domains, they can do so by using <a href="https://developers.cloudflare.com/ssl/ssl-for-saas/hostname-specific-behavior/custom-metadata">Custom Metadata and Workers</a>.</p><p>By adding metadata to an individual custom hostname and then deploying a Worker to read the data, you can use the Worker to customize per-hostname behavior.</p><p>Some customers use this functionality to add a customer_id field to each custom hostname that they then send in a request header to their origin. Another way to use this is to set headers like HTTP Strict Transport Security (HSTS) on a per-customer basis.</p>
    <div>
      <h3>Saving the best for last: Analytics!</h3>
      <a href="#saving-the-best-for-last-analytics">
        
      </a>
    </div>
    <p>Tomorrow, we have a very special announcement about how you can now get more visibility into your customers’ traffic and — more importantly —  how you can share this information back to them.</p>
    <div>
      <h3>Interested? Reach out!</h3>
      <a href="#interested-reach-out">
        
      </a>
    </div>
    <p>If you’re an Enterprise customer, and you’re interested in any of these features, reach out to your account team to get access today!</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[BYOIP]]></category>
            <guid isPermaLink="false">5tBnqDHqyjuO4hllMWCNQ</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust controls for your SaaS applications]]></title>
            <link>https://blog.cloudflare.com/access-saas-integrations/</link>
            <pubDate>Wed, 18 Aug 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ With Access in front of your SaaS applications, you can build Zero Trust rules that determine who can reach your SaaS applications in the same place where your rules for self-hosted applications and network access live. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qOj8XyHMpENRlubyEkdCw/dcea33d20e6cbd9eec6dbffc3b3558e7/Teams-for-SAAS-thumb-1.png" />
            
            </figure><p>Most teams start that journey by moving the applications that lived on their private networks into this <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. Instead of a private network where any user on the network is assumed to be trusted, the applications that use Cloudflare Access now check every attempt against the rules you create. For your end users, this makes these applications just feel like regular SaaS apps, while your security teams have full control and logs.</p><p>However, we kept hearing from teams that wanted to use their Access control plane to apply consistent security controls to their SaaS apps, and consolidate logs from self-hosted and SaaS in one place.</p><p>We’re excited to give your team the tools to solve that challenge. With Access in front of your SaaS applications, you can build Zero Trust rules that determine who can reach your SaaS applications in the same place where your rules for self-hosted applications and network access live. To make that easier, we are launching guided integrations with the Amazon Web Services (<a href="https://developers.cloudflare.com/cloudflare-one/tutorials/aws-sso-saas">AWS</a>) management console, <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/zendesk-sso-saas">Zendesk</a>, and <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/salesforce-saas">Salesforce</a>. In just a few minutes, your team can apply a Zero Trust layer over every resource you use and ensure your logs never miss a request.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare Access secures applications that you host by becoming the authoritative DNS for the application itself. All DNS queries, and subsequent HTTP requests, hit Cloudflare’s network first. Once there, Cloudflare can apply the types of identity-aware and context-driven rules that make it possible to move to a Zero Trust model. Enforcing these rules in our network means your application doesn’t need to change. You can secure it on Cloudflare, integrate your single sign-on (SSO) provider and other systems like Crowdstrike and Tanium, and begin building rules.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fzXkPD3VLf9Qd5wcrLrhI/a38164074f7d8dfb809809d428590602/image4-13.png" />
            
            </figure><p>SaaS applications pose a different type of challenge. You do not control where your SaaS applications are hosted — and that’s a big part of the value. You don’t need to worry about maintaining the hardware or software of the application.</p><p>However, that also means that your team cannot control how users reach those resources. In most cases, any user on the Internet can attempt to log in. Even if you incorporate SSO authentication or IP-based allowlisting, you might not have the ability to add location or device rules. You also have no way to centrally capture logs of user behavior on a per-request basis. Logging and permissions vary across SaaS applications — some are quite granular while others have non-existent controls and logging.</p><p>Cloudflare <a href="/cloudflare-access-for-saas/">Access for SaaS</a> solves that problem by injecting Zero Trust checks into the SSO flow for any application that supports <a href="https://www.cloudflare.com/learning/access-management/what-is-saml/">SAML authentication</a>. When users visit your SaaS application and attempt to log in, they are redirected through Cloudflare and then to your identity provider. They authenticate with your identity provider and are sent back to Cloudflare, where we layer on additional rules like device posture, multi factor method, and country of login. If the user meets all the requirements, Cloudflare converts the user’s authentication with your identity provider into a SAML assertion that we send to the SaaS application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YjDw22whJMNyIAiIBFNZn/8e34161664ba2fbbe05921045db7333c/image1-33.png" />
            
            </figure><p>We built support for SaaS applications by using <a href="https://workers.cloudflare.com/">Workers</a> to take the JWT and convert its content into SAML assertions that are sent to the SaaS application. The application thinks that Cloudflare Access is the identity provider, even though we’re just aggregating identity signals from your SSO provider and other sources into the JWT, and sending that summary to the app via SAML. All of this leverages Cloudflare’s global network and ensures users do not see a performance penalty.</p>
    <div>
      <h3>Enforcing managed devices and Gateway for SaaS applications</h3>
      <a href="#enforcing-managed-devices-and-gateway-for-saas-applications">
        
      </a>
    </div>
    <p>COVID-19 made it commonplace for employees to work from anywhere and, more concerning, from any device. Many SaaS applications contain sensitive data that should only be accessed with a corporately managed device. A benefit of SaaS tools is that they’re readily available from any device, it’s up to security administrators to enforce which devices can be used to log in.</p><p>Once Access for SaaS has been configured as the SSO provider for SaaS applications, policies that verify a device can be configured. You can then lock a tool like Salesforce down to only users with a device that has a known serial number, hard auth key plugged in, an up to date operating system and much more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BuzOFCnyzvAA0Mw97mopu/85ae375b2a4cce40805f49fd71ab1092/image2-25.png" />
            
            </figure><p>Cloudflare Gateway keeps your users and data safe from threats on the Internet by filtering Internet-bound connections that leave laptops and offices. Gateway gives administrators the ability to block, allow, or log every connection and request to SaaS applications.</p><p>However, users are connecting from personal devices and home WiFi networks, potentially bypassing Internet security filtering available on corporate networks. If users have their password and MFA token, they can bypass security requirements and reach into SaaS applications from their own, unprotected devices at home.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YdkBJicp5NcdO6qAfmpE7/f1bb7bbc02aa1c62f606e73d79fd0a1d/image3-19.png" />
            
            </figure><p>To ensure traffic to your SaaS apps only connects over Gateway-protected devices, Cloudflare Access will add a new rule type that requires Gateway when users login to your SaaS applications. Once enabled, users will only be able to connect to your SaaS applications when they use Cloudflare Gateway. Gateway will log those connections and provide visibility into every action within SaaS apps and the Internet.</p>
    <div>
      <h3>Getting started and what’s next</h3>
      <a href="#getting-started-and-whats-next">
        
      </a>
    </div>
    <p>It’s easy to get started with setting up Access for SaaS application. Visit the <a href="http://dash.teams.cloudflare.com">Cloudflare for Teams Dashboard</a> and follow one of our published guides.</p><p>We will make it easier to protect SaaS applications and will soon be supporting configuration via metadata files. We will also continue to publish SaaS app specific integration guides. Are there specific applications you’ve been trying to integrate? <a href="https://community.cloudflare.com/t/cloudflare-access-for-saas-which-guides-should-we-build-next/295672">Let us know in the community</a>!</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">54Ewhh7Xv9pCnpWCbC9LJh</guid>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Cloudflare for SaaS for Everyone]]></title>
            <link>https://blog.cloudflare.com/cloudflare-for-saas/</link>
            <pubDate>Thu, 15 Apr 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Before today, SSL for SaaS was only available to Enterprise customers. Today, we are excited to announce that our SaaS solution is available to everyone. And to reflect the evolution of the product since it was first released, we’re changing the name: Cloudflare for SaaS. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Software as a Service (SaaS) is one of the <a href="https://www.bmc.com/blogs/saas-growth-trends/">fastest-growing</a> business segments in the IT market. SaaS providers can be anything from a web hosting provider to a subscription service, to an e-commerce platform. While well-known SaaS providers are industry giants, every day new SaaS companies are created, with the potential to become the next Salesforce.</p><p>But while it’s a fast-growing segment, if you’re a SaaS company, you know it’s not an easy path to forge.</p><p>Cloudflare <a href="/introducing-ssl-for-saas/">released</a> a solution to help our SaaS customers four years ago — it’s called <a href="https://www.cloudflare.com/ssl-for-saas-providers/">SSL for SaaS</a>. It’s perfect for those who need to manage their customers’ websites and <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL certificates</a> at scale, and it’s been adopted by some of the leading SaaS companies in the world, from <a href="https://www.cloudflare.com/case-studies/wp-engine/">WP Engine</a> to <a href="https://www.cloudflare.com/case-studies/shopify/">Shopify</a> to <a href="https://www.cloudflare.com/case-studies/hubspot/">HubSpot</a>. As the product has evolved, it has become a one-stop-shop for SaaS providers looking to provide fast load times, unparalleled redundancy, and the strongest security to their customers. Now, over 10 million applications have inherited the full benefits of the Cloudflare network through their SaaS provider.</p><p>Before today, SSL for SaaS was only available to Enterprise customers. Today, we are excited to announce that our SaaS solution is available to everyone. And to reflect the evolution of the product since it was first released, we’re changing the name: Cloudflare for SaaS.</p><p>The beta is available today — submit your request <a href="https://forms.gle/crARoXd4taCtoSti8">here</a> to try it out!</p><p>If you're starting a SaaS business, the value proposition is clear: <a href="https://www.cloudflare.com/saas/">Cloudflare for SaaS</a> takes care of your underlying infrastructure, enabling you to keep your team lean and focused on building out your core solution. We’ve spent years investing in certificate issuance, building out our security and performance suite of products. Now we make it easy for you to extend all of the benefits we provide for your domain, to your end customers.</p>
    <div>
      <h2>It’s Technically Tricky to Build a SaaS Business</h2>
      <a href="#its-technically-tricky-to-build-a-saas-business">
        
      </a>
    </div>
    <p>We know first hand the many challenges of building a successful SaaS business. We are not going to tell you how to run your business, but we can share what we've learned about the core infrastructure requirements — and how Cloudflare is well-positioned to address them.</p><p>Today, the way many SaaS providers offer their services is by giving their customers a web application that’s hosted on their origin (or, often, on Cloudflare).</p><p>Suppose you’re building a SaaS service for building e-commerce sites. You can give your customers a dedicated subdomain, like myshop.example.com, but it’s likely that your customers will come back asking to run the application on myshopsactualname.com. To give customers a branded experience, SaaS providers are required to support vanity domains.</p><p>This is more onerous than it sounds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cCTIET38bt2HSbMMpgzzL/81724e63a38f62ae157a123a70889568/image3-7.png" />
            
            </figure><p>Once an application has been spun up, the next step is to provision TLS certificates for both the SaaS provider’s application and their customers. Developers may start looking into building out their homespun solution where they have to architect a whole pipeline around making API calls to a Certificate Authority. That means validating certificates, renewing them, and storing them.  There are many states to account for in order to prevent certificate failures and uptime for your customers, which translates into a heavy engineering investment.</p><p>But here’s the thing: every hour of time you invest in doing this, is an hour that can’t be spent on engineering efforts to build out the core part of your business.</p><p>You don’t have to just take our word for it. In building SSL for SaaS, we got to learn from best-in-class engineering teams who were running into challenges managing complex certificate management systems. <a href="https://www.cloudflare.com/case-studies/hubspot/">HubSpot</a>, for example, rolled out their in-house solution in 2015 where they deployed SSL certificates that were shared amongst their customers. This became a short-term solution when they began to run into scaling difficulties, resulting in slow certificate deployment, and leaving their customers with an unsatisfactory experience.</p>
    <div>
      <h3>Enter: SSL for SaaS</h3>
      <a href="#enter-ssl-for-saas">
        
      </a>
    </div>
    <p>Cloudflare has been focused on <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">certificate provisioning and management</a> for many years — it’s at the core of our business. When we launched Universal SSL in 2014, we built our SSL pipeline to manage millions of certificates. We then decided to extend the benefits of our managed certificate issuance platform in 2017 to our SaaS provider customers, allowing them to <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">secure their customer’s websites</a> that they are responsible for managing.</p><p>This allowed customers like Hubspot to secure thousands of domains, without dedicating a big amount of engineering effort towards it. But while SSL for SaaS was originally built to handle certificate issuance, management, and renewals on behalf of our customers and their own customers, we’ve extended our solution far beyond just that.</p>
    <div>
      <h3>Beyond SSL</h3>
      <a href="#beyond-ssl">
        
      </a>
    </div>
    <p>For SaaS providers, their customers’ businesses are reliant on them staying online, always being available, and being performant. When their customers sign up for their business, that’s the underlying promise that the SaaS provider is making.</p><p>Every day, the Internet sees attacks, malicious traffic, unexpected spikes in requests, and so on.</p><p>At Cloudflare, we’ve heavily invested in building out one of the largest, most resilient networks, with solutions that keep your applications and origins protected. This is one of our core value propositions for customers, and now SaaS-providers can extend it to their customers, too. With built-in DDoS mitigation, a resilient Web Application Firewall (WAF), and a Carrier-grade Bot Management solution, you can prevent costly disruptions and downtime for you and your customers, so that regardless of who attackers are targeting, you both stay online.</p><p>We not only take the burden off your engineering and support teams, but we make it easy for your end customers to inherit your security settings. Whatever benefits you set up for yourself, your customers will instantly assume them.</p>
    <div>
      <h3>Beyond Security</h3>
      <a href="#beyond-security">
        
      </a>
    </div>
    <p>As a business, you want to provide the best experience for your users. Speed plays a big part in how we perceive our online experiences.</p><p>For SaaS businesses, investing in performance is a must. When doing so, you need to keep in mind that your customers are global and their eyes are located worldwide, meaning that end users might not always be close to your origin server.</p><p>Cloudflare for SaaS allows you to take advantage of our performant Anycast network with data centers in more than 100 countries that, when coupled with our speed and performance features like caching and Argo Smart Routing, can improve performance by 30%. This means that, if you’re an e-commerce site and your origin server is in North America, your global customers in Asia will get the same lightning-fast load times that your US visitors get, giving every customer the best experience.</p>
    <div>
      <h2>Built for Giants … and Future Giants</h2>
      <a href="#built-for-giants-and-future-giants">
        
      </a>
    </div>
    <p>In January, we <a href="https://twitter.com/dinasaur_404/status/1351703331744321536">announced</a> on Twitter that we had an SSL for SaaS beta open. What we didn’t expect was that ~80% of our beta users were building their SaaS application on Workers. In retrospect, it makes total sense: in the same way that managing and scaling an SSL pipeline can take precious time and resources from building out the core business, managing and scaling infrastructure can be costly and time-consuming.</p><p>By marrying Cloudflare for SaaS with Workers, SaaS companies can unleash their developers — we’ll take care of not just certificate management, security, and performance, but also the burden of infrastructure.</p><p>You write the code, and we’ll take care of the rest.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vju7DxminkYK3iDbfP6NZ/fd541a695b7b0e32b9bf2a64db4e2b68/image2-15.png" />
            
            </figure><p>The best part of building for developers is getting to see what they build. Here, we’re going to showcase some of the amazing projects already built on our platform that have taken the path we’ve just described:</p>
    <div>
      <h3>Statusflare: A Status Page Platform</h3>
      <a href="#statusflare-a-status-page-platform">
        
      </a>
    </div>
    <p><a href="http://statusflare.com">Statusflare</a> is a tool for monitoring your websites and applications because the only thing worse than downtime is not knowing about it. The Statusflare team has built out a solution that allows businesses to deploy global checks around the world to monitor uptime, metrics, and server response time. Beyond that, they allow their customers to deploy status pages, so their customers stay informed about the availability of their services.</p><p>When building out their status page product, the Statusflare team decided to use Workers as their deployment platform. This allowed them to spend all their time writing code and building out their API, and zero time worrying about deploying an origin server. Once the Statusflare team had finished building their application, they were ready to integrate it with their customers’ vanity domains, so that anyone could set up a status page for their website.</p><p>The challenge they then faced was getting their customers the latest version of their product. To start, they decided to open source their solution, give their customers the Workers script, and have their customers deploy it to get their status page up and running. But this makes updates complicated, and instead of giving their end-users the latest version, customers were now responsible for updates.</p><p>Not just that — they also had to spend time integrating with certificate authorities to issue certificates, so their customers’ pages stay protected.</p><p>Statusflare found that Cloudflare for SaaS was the perfect solution to help them grow. With easy-to-use integration for custom domains, all they now had to do was to click a few buttons, and their end-users could use a vanity domain, pull the latest update of the status page, and get a certificate deployed. Beyond that, Statusflare is now looking to integrate their solution with Cloudflare Access and Teams, so their customers can keep their monitoring private and only allow authorized users. With built-in security and rate limiting, Statusflare never has to worry about the number of incoming requests, or scaling their application. Statusflare was very excited to share that having everything in one place means that they don’t have to worry about scaling or provisioning servers, they don’t have to worry about the availability of their customer’s domains, and instead of investing time in keeping their application stable, they can now focus on writing code and building out their product.</p><blockquote><p>With Cloudflare, our application scales on its own, it scales to infinity.- <b>Adam, founder of Statusflare</b>.</p></blockquote>
    <div>
      <h3>PLUMA: All-in-One Platform for Publishing Blogs and Podcasts</h3>
      <a href="#pluma-all-in-one-platform-for-publishing-blogs-and-podcasts">
        
      </a>
    </div>
    <p><a href="https://pluma.cloud/">PLUMA</a> is an audio hosting service, a blogging platform, and a privacy-focused analytics service for websites and mobile apps that is currently in the making. It’s built on Workers, meaning the application fully runs on Cloudflare’s edge, with 0ms cold starts. With Workers KV, PLUMA is able to store all of its data, i.e. session data, static files, and logs, on Cloudflare’s edge, providing their end-users with a low latency service. One of the biggest requests from PLUMA users was for customers to be able to use their own branded domain, instead of one that PLUMA provides. With Cloudflare for SaaS, PLUMA can easily offer this experience to their end-users, with the extended benefit of keeping their customers’ sites secured with a TLS certificate.</p><blockquote><p>Cloudflare for SaaS makes it easy to integrate any number of domains with Workers. This makes Cloudflare a wonderful platform for building out low latency serverless applications.- <b>Pier Bover, founder of PLUMA</b></p></blockquote>
    <div>
      <h3>Plink: Smart Links for Podcasts</h3>
      <a href="#plink-smart-links-for-podcasts">
        
      </a>
    </div>
    <p>Plink makes universal links for podcasts. One of the top feature requests from their customers has been to have their own custom domains. As an early-stage startup, Plink was looking for a cost-effective solution that would help them optimize their application, scale, and provide a customized experience for their users. With Workers and Workers KV, they were able to optimize their core scripts and functionality, without worrying about DevOps. This, coupled with Cloudflare for SaaS, allowed them to create a “custom-branded” experience of their service to external domains that were owned by their customers.</p><blockquote><p>Connecting Plink’s API with Cloudflare’s API has been a seamless experience. In general, building with Workers is amazing! I'm excited to provide a branded experience for Plink customers with Cloudflare for SaaS. - <b>Scott Mathson, Founder at Plink</b></p></blockquote>
    <div>
      <h2>Try out Cloudflare for SaaS Today!</h2>
      <a href="#try-out-cloudflare-for-saas-today">
        
      </a>
    </div>
    <p>When developers are starting to build out their next SaaS application, there’s a long list of things they don’t want to worry about. Instead of allocating their engineering resources to work on their infrastructure, they should be dedicating their time building the next billion dollar business.</p><p>That’s what we’re enabling. And with our beta announced today, we’re doing it for everyone.</p><p>The end result: you can build the next groundbreaking SaaS business, and we’ll take care of the rest. To sign up for the beta, submit your request <a href="https://forms.gle/crARoXd4taCtoSti8">here</a>. We will be admitting customers on a rolling basis, and allotting 20 custom hostnames to each domain.</p><p>Request to join our beta <a href="https://forms.gle/crARoXd4taCtoSti8">here</a>!</p>
    <div>
      <h2>Enterprise customers, stay tuned</h2>
      <a href="#enterprise-customers-stay-tuned">
        
      </a>
    </div>
    <p>While we’re super excited about making Cloudflare for SaaS available to everyone, we know that our largest Enterprise customers have some demanding and specialized needs. We’ve been hard at work to build out new features to satisfy them. Stay tuned for an exciting announcement in the upcoming weeks!</p> ]]></content:encoded>
            <category><![CDATA[Developer Week]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <guid isPermaLink="false">1O2h56PLWBcxtCHNGK0U64</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
    </channel>
</rss>