Organizations
Get your Zero Trust organization
Create your Zero Trust organization
Update your Zero Trust organization
Revoke all Access tokens for a user
ModelsExpand Collapse
type Organization struct{…}
When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
When set to true, users skip the identity provider selection step during login.
Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the deny_unmatched_requests_exempted_zone_names array.
Contains zone names to exempt from the deny_unmatched_requests feature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request.
Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
MfaConfig OrganizationMfaConfigOptionalConfigures multi-factor authentication (MFA) settings for an organization.
Configures multi-factor authentication (MFA) settings for an organization.
AllowedAuthenticators []OrganizationMfaConfigAllowedAuthenticatorOptionalLists the MFA methods that users can authenticate with.
Lists the MFA methods that users can authenticate with.
Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains “mfa”. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
MfaSSHPivKeyRequirements OrganizationMfaSSHPivKeyRequirementsOptionalConfigures SSH PIV key requirements for MFA using hardware security keys.
Configures SSH PIV key requirements for MFA using hardware security keys.
PinPolicy OrganizationMfaSSHPivKeyRequirementsPinPolicyOptionalDefines when a PIN is required to use the SSH key. Valid values: never (no PIN required), once (PIN required once per session), always (PIN required for each use).
Defines when a PIN is required to use the SSH key. Valid values: never (no PIN required), once (PIN required once per session), always (PIN required for each use).
Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
SSHKeySize []OrganizationMfaSSHPivKeyRequirementsSSHKeySizeOptionalSpecifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
SSHKeyType []OrganizationMfaSSHPivKeyRequirementsSSHKeyTypeOptionalSpecifies the allowed SSH key types. Valid values are ecdsa, ed25519, and rsa.
Specifies the allowed SSH key types. Valid values are ecdsa, ed25519, and rsa.
TouchPolicy OrganizationMfaSSHPivKeyRequirementsTouchPolicyOptionalDefines when physical touch is required to use the SSH key. Valid values: never (no touch required), always (touch required for each use), cached (touch cached for 15 seconds).
Defines when physical touch is required to use the SSH key. Valid values: never (no touch required), always (touch required for each use), cached (touch cached for 15 seconds).
The amount of time that tokens issued for applications will be valid. Must be in the format 300ms or 2h45m. Valid time units are: ns, us (or µs), ms, s, m, h.
A description of the reason why the UI read only field is being toggled.
The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format 300ms or 2h45m. Valid time units are: ns, us (or µs), ms, s, m, h.