![]() ![]() Today, we’re sharing that feature with your team. It wasn’t until I watched my coworkers smash the representation that I realized just how frustrated they were with the VPN. They were able to have one made in time for retreat and we invited team members on stage to swing away. Our security team considered this cause to celebrate and set a new goal: finding a custom piñata in the shape of an actual VPN appliance. We were able to move applications behind Access and reach them over SSH by starting with the best of Cloudflare. We used Cloudflare’s command line tool, cloudflared, to establish the connection between your device and the server you need to reach. We accelerated the performance of those connections by leveraging Argo smart routing. We relied on Argo Tunnel to secure the SSH connections. We started by building on top of some of the strongest capabilities of other Cloudflare products. We agreed with the sense of urgency and got to work solving the SSH challenge. The Access team met with our security group and we set retreat week as the deadline for moving this category of applications behind Access, as part of a holistic effort to increase enterprise identity and access management. Our CSO set a company-wide goal to retire last decade’s model of network security - without compromising security while doing so. Once inside a private network, attackers can expose vulnerabilities and reach sensitive data. While the VPN inconvenienced most users, our security team flagged disabling it as a potential risk. Whenever we needed to push code or review a pull request, we had to fall back to our cumbersome VPN. We improved the daily workflow of every team member each time we moved another application behind Access. Our teammates added single sign-on support to the Cloudflare dashboard by combining Access and our serverless product, Workers. ![]() We started with browser-based applications, moved to CLI operations, and then began adding a growing list of single sign-on integrations. We built Access to replace our corporate VPN. We’re excited to release that same feature so that your team can also destroy your own VPN (piñata not included). You can now place applications that require SSH connections, like your source control repository, behind Cloudflare Access. The latest feature added to Cloudflare Access let us celebrate the replacement of our clunky VPN with a faster, safer way to reach our internal applications. Over 750 team members from nearly a dozen offices spent three days learning, bonding and some of them got to smash a VPN piñata on stage with a baseball bat. We held our annual Cloudflare Retreat last week.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |