Skip to content
Visit Access on GitHub
Set theme to dark (⇧+D)

Policies and rules

This section addresses a few common policy configurations and best practices.

For a basic overview of how to create, edit, and delete Policies on the dashboard, please see the Policies page in the Getting started section.

Example policy configurations


All rule actions must have at least one Include. Add a Require rule in the same policy action to enforce additional checks. Finally, if the policy contains an Exclude rule, users meeting that definition are prevented from reaching the application.

AllowIncludeEmails Ending In:

Result: this configuration lets any user with an email address, as validated against an IdP, reach the application.

AllowIncludeCountry: Portugal
RequireEmails Ending In:

Result: this configuration lets any user from Portugal with a email address, as validated against an IdP, reach the application, except for user-1 and user-2.


This action explicitly prevents users from reaching an application behind Access. Block actions enforce similar behavior to allow actions that contain an Exclude rule without the need to allow specific users.


Result: this configuration blocks every request to the application, except for requests from


Use this rule action to bypass Access for a specific path of the application, a subset of users or for the entire application. The bypass rule action disables any Access enforcement for traffic that meets the defined rule criteria.

Let’s take an example website secured with Access with a third-party service that needs access to a specific endpoint. You can configure traffic to bypass Access and access that endpoint. You can also whitelist a range of IP addresses to bypass Access or allow all traffic by setting the rule to include everyone.

If the service does not publish its IP range or it changes periodically, you can choose to include Everyone in the Bypass action so that any request can access the specified path.

Service Auth

Service Auth rules enforce authentication flows that do not require an identity provider IdP) login, such as service tokens and mutual TLS.

Rule ordering

Access policies trigger sequentially, based on their position in your Cloudflare dashboard, except for Bypass actions; Access evaluates Bypass actions first, in the order they appear. For Allow, Block and Service Auth actions, Access enforces the decision starting at the top of the list in the rules menu. You can modify the order in which rules trigger by dragging and dropping.

Rule ordering

Changes in user context

For self-hosted applications, Access evaluates the following attributes on every request:

  • IP Address
  • Country
  • mTLS Certificate
  • Service Token

If any of these attributes change and become out of policy, the user’s session will be immediately terminated, regardless of their remaining session length. For example, you could configure a policy with the following criteria:

AllowIncludeCountry: United States
RequireEmails ending in:
RequireIP ranges:

Where is the IP address of your office network. This would grant access to your team members from the United States who connect from your office network. If a user logs into the application with a session length of 8 hours, and leaves the office mid-session to connect from a different IP address, that user will be blocked.

The following attributes are only evaluated on login:

  • Email
  • Emails Ending in
  • All attributes for Access for SaaS applications

For SaaS applications, policies are only evaluated at the time of login. A user’s session will then be controlled by the specific SaaS application.

Application Paths

You can create unique rules for parts of an application that share a root path. When multiple rules are set for a common root path, they do not inherit rules. Instead, the more specific rule takes precedence. For example:

  • An example application is deployed at that anyone on the engineering team should be able to access.
  • Policy A restricts access to that path to members of the engineering team.
  • A tool deployed at that only the executive team should be able to access.
  • When using only policy A, this path inherits the rules from policy A and members of the engineering team can access that path. You can instead create a second policy, policy B, to restrict access to the executive team only.
  • When applying Policy B to, the more specific policy takes precedence. The /exec path is gated by policy B instead of relying on the rules in policy A.


You can configure an Application for an apex domain, a particular subdomain, or all subdomains using a wildcard rule. Similarly, you can apply an Access Application to an entire website or protect a specific path. When protecting the entire website, leave the path field empty. You specify paths, for example /admin, as well.

Policy Wildcards

Access does not support overlapping definitions. For example, when setting rules for /admin and /admin/specific separately, /admin/specific does not inherit the rule set for /admin. The more specific rule is enforced.

Access does not support port numbers in the URL. Requests to URLs with port numbers are redirected to the URL and the port numbers stripped.

Using Wildcards In Rules

You can secure any subdomain of the apex domain in Cloudflare Access by using a wildcard in the rule. Wildcard rules use an asterisk (*) in the Subdomain field in the Application Overview menu.

When using wildcards in rules, keep in mind that:

  • Using a wildcard in the Subdomain field does not cover the apex domain. That is, a wildcard rule that controls access using the format, *, covers and, but not You must create separate rules for the apex domain.

  • Using a wildcard in the Subdomain field does not cover multi-level subdomains. For instance, a wildcard rule like * would cover but not

Enforcing MFA

You can build rules into policies that require users to authenticate with certain types of MFA methods (if supported by your IdP). When added, Cloudflare Access will reject user logins that did not use the required MFA method.

To add an MFA requirement to your application, follow the instructions below.

  1. Navigate to the application in the Cloudflare for Teams dashboard, or create a new application.

  2. In the Policies section of the a application, edit an existing rule that contains an identity requirement or add a new rule.

    The rule must contain an Include rule which defines an identity. For example, the Include rule should allow for users who are part of an email domain, identity provider group, or Access Group.

  3. In the rule builder, add a Require action.

  4. Select Authentication Method and choose mfa - multiple-factor authentication.


  1. Save the rule.