Difference between revisions of "Cloudflared access"
Jump to navigation
Jump to search
(3 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
[[cloudflared access login]] | [[cloudflared access login]] | ||
+ | [[cloudflared access curl]] | ||
+ | [[cloudflared access token]] | ||
+ | [[cloudflared access ssh-gen]] | ||
+ | [[cloudflared access ssh-config]] | ||
+ | NAME: | ||
+ | cloudflared access - access <subcommand> | ||
+ | |||
+ | USAGE: | ||
+ | cloudflared access command [command options] [arguments...] | ||
+ | |||
+ | DESCRIPTION: | ||
+ | Cloudflare Access protects internal resources by securing, authenticating and monitoring access | ||
+ | per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are | ||
+ | able to reach sensitive resources. The commands provided here allow you to interact with Access protected | ||
+ | applications from the command line. | ||
+ | |||
+ | COMMANDS: | ||
+ | login login <url of access application> | ||
+ | curl curl [--allow-request, -ar] <url> [<curl args>...] | ||
+ | token token -app=<url of access application> | ||
+ | tcp, rdp, ssh, smb | ||
+ | ssh-config | ||
+ | ssh-gen | ||
+ | help, h Shows a list of commands or help for one command | ||
+ | |||
+ | OPTIONS: | ||
+ | --help, -h show help (default: false) | ||
+ | |||
+ | == Related == | ||
+ | * [[Cloudflare Access]] | ||
− | {{cloudflared}} | + | == See also == |
+ | * {{cloudflared access}} | ||
+ | * {{cloudflared}} | ||
+ | |||
+ | [[Category:Cloudflare]] |
Latest revision as of 10:21, 27 May 2024
cloudflared access login cloudflared access curl cloudflared access token cloudflared access ssh-gen cloudflared access ssh-config
NAME: cloudflared access - access <subcommand> USAGE: cloudflared access command [command options] [arguments...] DESCRIPTION: Cloudflare Access protects internal resources by securing, authenticating and monitoring access per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are able to reach sensitive resources. The commands provided here allow you to interact with Access protected applications from the command line. COMMANDS: login login <url of access application> curl curl [--allow-request, -ar] <url> [<curl args>...] token token -app=<url of access application> tcp, rdp, ssh, smb ssh-config ssh-gen help, h Shows a list of commands or help for one command OPTIONS: --help, -h show help (default: false)
Related[edit]
See also[edit]
Advertising: