Abstract


  • A Cloudflare security service that allows you to set up policies and rules that let you define who can or cannot access your applications based on user Identity, network attributes, and device posture
  • You can access the dashboard at Cloudflare Access

Access protected website via a temporary token

We can obtain a JWT token which authenticates HTTP Request sent to the websites that are protected by Cloudflare Access. Use cloudflared access login <your_website_endpoint> to generate a temporary_token. Then you can access the website using curl -H "cf-access-token: <temporary_token>" <your_website_resources>, the flag -O flag downloads the resource as a file to your local machine.

Refer to Cloudflare Zero Trust docs for more details.

Cloudflare Access Temporary Authentication


  • Users are required to proof their identity first, then obtain approval from application administrator before they can access a specific application
  • The administrator will receive an email notification with the user identity to approve or deny the request. Unlike a typical Allow policy, the user will have to request access at the end of each session. This allows you to define the users who should have persistent access and those who must request temporary access
  • Refer to Cloudflare Access - Temporary authentication for setup guide

Email addresses of the approvers

Make sure you setup App Launcher · Cloudflare Zero Trust docs and create a policy that authenticate the emails of the approvers, or there is no way for you to approve the temporary authentication request

And you need a different approver email to approve temporary authentication for another approver email!

Allow some users to access without approval

You can optionally add a second Allow policy for users who should have persistent access (Access without the need to get approved). But make sure this second allow policy is placed above the temporary authentication policy, an example is shown below