Cloudflare Access can be configured to support a number of common use cases as your organization migrates from a VPN to Cloudflare’s zero-trust model. This section provides examples for common scenarios.
|Bypass Policies||Instructions on policies used to deliberately expose a specific endpoint.|
|Application SSO||The JWT created by Cloudflare Access can be used for SSO authorization to certain applications.|
|GitLab||Guide to securing self-managed GitLab instances, including the web application and SSH flows.|
|DigitalOcean||Guide to securing infrastructure in DigitalOcean.|