Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TME-117 - New RAG on how to extend CF access native features with ser… #17317

Merged
merged 6 commits into from
Oct 10, 2024

Conversation

nouvellonsteph
Copy link
Contributor

@nouvellonsteph nouvellonsteph commented Oct 4, 2024

…verless computing

Summary

New RAG demonstration how Cloudflare Access native capabilities can be expanded with serverlesss computing

Documentation checklist

Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 4 total issue(s) found.

Copy link

cloudflare-workers-and-pages bot commented Oct 4, 2024

Deploying cloudflare-docs with  Cloudflare Pages  Cloudflare Pages

Latest commit: 67ee6a4
Status: ✅  Deploy successful!
Preview URL: https://a407cec7.cloudflare-docs-7ou.pages.dev
Branch Preview URL: https://nouvellonsteph-tme-117.cloudflare-docs-7ou.pages.dev

View logs

@nouvellonsteph nouvellonsteph force-pushed the nouvellonsteph/TME-117 branch from 612c6d1 to 3101f57 Compare October 4, 2024 13:58
Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 4 total issue(s) found.

@nouvellonsteph nouvellonsteph force-pushed the nouvellonsteph/TME-117 branch 5 times, most recently from d271e91 to 62b6cc4 Compare October 10, 2024 08:57
@github-actions github-actions bot added size/l and removed size/m labels Oct 10, 2024
Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 10 total issue(s) found.

Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 1 total issue(s) found.

nouvellonsteph and others added 3 commits October 10, 2024 11:10
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
Making the sidebar menu item shorter for readability
Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 2 total issue(s) found.


Note: We resolved prior Hyperlint review comments because:

We updated our inline suggestion AI.

We do this to avoid keeping outdated or irrelevant comments around. We'll leave a new review with current comments below.

securitypedant and others added 2 commits October 10, 2024 08:54
…access-with-serverless.mdx

Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
Copy link
Contributor

@securitypedant securitypedant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Awesome new reference architecture

@bllchmbrs
Copy link
Contributor

bllchmbrs commented Oct 10, 2024

Hey @nouvellonsteph , Hyperlint developer here. Something unexpected is going on with this PR. I'm looking at it now and will edit this comment with more information.


Edit 1: The outstanding issue that Hyperlint has on this PR is a Terms-error. It can safely be ignored as it refers to a pedantic issue about JSON being capitalized in the URL, based on your URL configuration.

I am working on resolving this issue now to get you to ✅


Edit 2: would you mind emailing [email protected] I have a small follow up question.

Copy link
Contributor

@hyperlint-ai hyperlint-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 files reviewed, 1 total issue(s) found.

}
```

Cloudflare exposes a specific [endpoint](/cloudflare-one/identity/authorization-cookie/validating-json/#_top) to allow anyone to validate and expand a Cloudflare signed JWT.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Cloudflare exposes a specific [endpoint](/cloudflare-one/identity/authorization-cookie/validating-json/#_top) to allow anyone to validate and expand a Cloudflare signed JWT.
Cloudflare exposes a specific [endpoint](/cloudflare-one/identity/authorization-cookie/validating-json/#_top) to allow anyone to validate and expand a Cloudflare signed JWT.

Issues:

  • Style Guide - (Terms-error) Use 'JSON' instead of 'json'.

Fix Explanation:

The term 'json' should be capitalized to 'JSON' to adhere to standard style guides for acronyms. This change ensures consistency and professionalism in the documentation.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@nouvellonsteph , resolving this comment will give you the ✅!

As mentioned above, it'd be helpful to email support @ hyperlint. I've got a quick question or two that's just not relevant for this PR.

Please ping me directly on GH with any other questions or concerns!

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bllchmbrs Thanks so much for reaching out about this! I'm the PM for the PCX team and I'll email you shortly to see if I can get you the info you're after.

@nouvellonsteph nouvellonsteph merged commit ab965e7 into production Oct 10, 2024
12 of 13 checks passed
@nouvellonsteph nouvellonsteph deleted the nouvellonsteph/TME-117 branch October 10, 2024 17:20
Copy link
Contributor

@haleycode haleycode left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some minor comments here for clarity and flow but approved!


## Introduction

Companies using Zero Trust Network Access (ZTNA) services build policies to determine if a user can access a protected resource such as a privately hosted Wiki server or source code repository. Policies typically use group membership, authentication methods, device security posture to determine which users can access which resources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Companies using Zero Trust Network Access (ZTNA) services build policies to determine if a user can access a protected resource such as a privately hosted Wiki server or source code repository. Policies typically use group membership, authentication methods, device security posture to determine which users can access which resources.
Companies use Zero Trust Network Access (ZTNA) services to build policies to determine if a user can access protected resources such as privately hosted wiki servers or source code repositories. Policies typically use group membership, authentication methods or device security posture to determine which users can access which resources.


Secure access requires a range of attributes being available to the policy engine for evaluation. With Cloudflare's ZTNA service, [Access](/cloudflare-one/policies/access/), it is possible to include in the policy an external request to another API that provides part of the data required for the access decision.

For example, you might have a policy which states all members of the group "Engineers", who have authenticated with credentials that required a hard token, can have access to the self-hosted source code repository. But you also want to only allow engineers who have completed security training. That data might be available in another system, so Cloudflare allows you to, as part of the policy check, make a call using [Workers](https://workers.cloudflare.com/) to the training system to determine if this user has passed security training.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
For example, you might have a policy which states all members of the group "Engineers", who have authenticated with credentials that required a hard token, can have access to the self-hosted source code repository. But you also want to only allow engineers who have completed security training. That data might be available in another system, so Cloudflare allows you to, as part of the policy check, make a call using [Workers](https://workers.cloudflare.com/) to the training system to determine if this user has passed security training.
For example, you might have a policy which states all members of the group "Engineers", who have authenticated with credentials that required a hard token, can have access to the self-hosted source code repository. But you also want to only allow engineers who have completed security training. That data might be available in another system, so as part of the policy check, Cloudflare allows you to make a call to the training system using [Workers](https://workers.cloudflare.com/) to determine if a user has passed security training.

</RelatedProduct>

<RelatedProduct header="Access" href="/cloudflare-one/" product="cloudflare-one">
Cloudflare Zero Trust replaces legacy security perimeters with Cloudflare's global network, making the Internet faster and safer for teams around the world
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Cloudflare Zero Trust replaces legacy security perimeters with Cloudflare's global network, making the Internet faster and safer for teams around the world
Cloudflare Zero Trust replaces legacy security perimeters with Cloudflare's global network, making the Internet faster and safer for teams around the world.

elithrar pushed a commit that referenced this pull request Oct 15, 2024
#17317)

* TME-117 - New RAG on how to extend CF access native features with serverless computing

* Apply suggestions from code review

Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>

* Update augment-access-with-serverless.mdx

Making the sidebar menu item shorter for readability

* Update augment-access-with-serverless.mdx

Minor changes

* Update src/content/docs/reference-architecture/diagrams/sase/augment-access-with-serverless.mdx

Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>

* Update augment-access-with-serverless.mdx

Fixing links

---------

Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
Co-authored-by: Simon Thorpe <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants