Difference between revisions of "Cloudflared access"

From wikieduonline
Jump to navigation Jump to search
(Created page with "{{lc}} {{cloudflared}}")
 
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{lc}}
 
{{lc}}
  
 +
[[cloudflared access login]]
 +
[[cloudflared access curl]]
 +
[[cloudflared access token]]
 +
[[cloudflared access ssh-gen]]
 +
[[cloudflared access ssh-config]]
  
 +
NAME:
 +
    cloudflared access - access <subcommand>
 +
 +
USAGE:
 +
    cloudflared access command [command options] [arguments...]
 +
 +
DESCRIPTION:
 +
    Cloudflare Access protects internal resources by securing, authenticating and monitoring access
 +
          per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are
 +
          able to reach sensitive resources. The commands provided here allow you to interact with Access protected
 +
          applications from the command line.
 +
 +
COMMANDS:
 +
    login              login <url of access application>
 +
    curl                curl [--allow-request, -ar] <url> [<curl args>...]
 +
    token              token -app=<url of access application>
 +
    tcp, rdp, ssh, smb 
 +
    ssh-config         
 +
    ssh-gen           
 +
    help, h            Shows a list of commands or help for one command
 +
 +
OPTIONS:
 +
    --help, -h  show help (default: false)
 +
   
  
  
{{cloudflared}}
+
 
 +
== Related ==
 +
* [[Cloudflare Access]]
 +
 
 +
== See also ==
 +
* {{cloudflared access}}
 +
* {{cloudflared}}
 +
 
 +
[[Category:Cloudflare]]

Latest revision as of 10:21, 27 May 2024

cloudflared access login
cloudflared access curl
cloudflared access token
cloudflared access ssh-gen
cloudflared access ssh-config
NAME:
   cloudflared access - access <subcommand>

USAGE:
   cloudflared access command [command options] [arguments...]

DESCRIPTION:
   Cloudflare Access protects internal resources by securing, authenticating and monitoring access
         per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are
         able to reach sensitive resources. The commands provided here allow you to interact with Access protected
         applications from the command line.

COMMANDS:
   login               login <url of access application>
   curl                curl [--allow-request, -ar] <url> [<curl args>...]
   token               token -app=<url of access application>
   tcp, rdp, ssh, smb  
   ssh-config          
   ssh-gen             
   help, h             Shows a list of commands or help for one command

OPTIONS:
   --help, -h  show help (default: false)
   


Related[edit]

See also[edit]

Advertising: