Example configurations
Cloudflare Access can be configured to support a number of common use cases as your organization migrates from a VPN to Cloudflare’s zero trust model. This section provides examples of common scenarios.
Guide | Description |
---|---|
Bypass Policies | Instructions on policies used to deliberately expose a specific endpoint. |
Application SSO | The JWT created by Cloudflare Access can be used for SSO authorization to certain applications. |
GitLab | Guide to securing self-managed GitLab instances, including the web application and SSH flows. |
DigitalOcean | Guide to securing infrastructure in DigitalOcean. |