
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 05:34:47 GMT</lastBuildDate>
        <item>
            <title><![CDATA[What’s new in Cloudflare: Account Owned Tokens and Zaraz Automated Actions]]></title>
            <link>https://blog.cloudflare.com/account-owned-tokens-automated-actions-zaraz/</link>
            <pubDate>Thu, 14 Nov 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare customers can now create Account Owned Tokens , allowing more flexibility around access control for their Cloudflare services. Additionally, Zaraz Automation Actions streamlines event tracking and third-party tool integration.  ]]></description>
            <content:encoded><![CDATA[ <p>In October 2024, we started publishing roundup blog posts to share the latest features and updates from our teams. Today, we are announcing general availability for Account Owned Tokens, which allow organizations to improve access control for their Cloudflare services. Additionally, we are launching Zaraz Automated Actions, which is a new feature designed to streamline event tracking and tool integration when setting up third-party tools. By automating common actions like pageviews, custom events, and e-commerce tracking, it removes the need for manual configurations.</p>
    <div>
      <h2>Improving access control for Cloudflare services with Account Owned Tokens</h2>
      <a href="#improving-access-control-for-cloudflare-services-with-account-owned-tokens">
        
      </a>
    </div>
    <p>Cloudflare is critical infrastructure for the Internet, and we understand that many of the organizations that build on Cloudflare rely on apps and integrations outside the platform to make their lives easier. In order to allow access to Cloudflare resources, these apps and integrations interact with Cloudflare via our API, enabled by access tokens and API keys. Today, the API Access Tokens and API keys on the Cloudflare platform are owned by individual users, which can lead to some difficulty representing services, and adds an additional dependency on managing users alongside token permissions.</p>
    <div>
      <h3>What’s new about Account Owned Tokens</h3>
      <a href="#whats-new-about-account-owned-tokens">
        
      </a>
    </div>
    <p>First, a little explanation because the terms can be a little confusing. On Cloudflare, we have both Users and Accounts, and they mean different things, but sometimes look similar. Users are people, and they sign in with an email address. Accounts are not people, they’re the top-level bucket we use to organize all the resources you use on Cloudflare. Accounts can have many users, and that’s how we enable collaboration. If you use Cloudflare for your personal projects, both your User and Account might have your email address as the name, but if you use Cloudflare as a company, the difference is more apparent because your user is “<a><u>joe.smith@example.com</u></a>” and the account might be “Example Company”. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5tcNkxDjYz9jAXnfV0bPON/920a9dade7145de2adee21afa43d786e/image13.jpg" />
          </figure><p>Account Owned Tokens are not confined by the permissions of the creating user (e.g. a user can never make a token that can edit a field that they otherwise couldn’t edit themselves) and are scoped to the account they are owned by. This means that instead of creating a token belonging to the user “<a><u>joe.smith@example.com</u></a>”, you can now create a token belonging to the account “Example Company”.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ibh4sT2wgVLVTgqgv2rtO/eb972a5b1c5fa0f70471631430a8ff91/image8.jpg" />
          </figure><p>The ability to make these tokens, owned by the account instead of the user, allows for more flexibility to represent what the access should be used for.</p><p>Prior to Account Owned Tokens, customers would have to have a user (<a><u>joe.smith@example.com</u></a>) create a token to pull a list of Cloudflare zones for their account and ensure their security settings are set correctly as part of a compliance workflow, for example. All of the actions this compliance workflow does are now attributed to joe.smith, and if joe.smith leaves the company and his permissions are revoked, the compliance workflow fails.</p><p>With this new release, an Account Owned Token could be created, named “compliance workflow”, with permissions to do this operation independently of <a><u>joe.smith@example.com</u></a>. All actions this token does are attributable to “compliance workflow”. This token is visible and manageable by all the superadmins on your Cloudflare account. If joe.smith leaves the company, the access remains independent of that user, and all super administrators on the account moving forward can still see, edit, roll, and delete the token as needed.</p><p>Any long-running services or programs can be represented by these types of tokens, be made visible (and manageable) by all super administrators in your Cloudflare account, and truly represent the service, instead of the users managing the service. Audit logs moving forward will log that a given token was used, and user access can be kept to a minimum.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Account Owned Tokens can be found on the new “API Tokens” tab under the “Manage Account” section of your Cloudflare dashboard, and any Super Administrators on your account have the capability to create, edit, roll, and delete these tokens. The API is the same, but at a new <code>/account/&lt;accountId&gt;/tokens</code> endpoint.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uZFVUp1RRP1NgZli9RAYN/5e2b90bea51b7b45bb25478120fd9024/Screenshot_2024-11-13_at_20.14.43.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1kiUi4lsJESJqr9HhgCS92/b4b0a3e955742346a5c945601fff4885/image3.png" />
          </figure>
    <div>
      <h3>Why/where should I use Account Owned Tokens?</h3>
      <a href="#why-where-should-i-use-account-owned-tokens">
        
      </a>
    </div>
    <p>There are a few places we would recommend replacing your User Owned Tokens with Account Owned Tokens:</p><p>1. <b>Long-running services that are managed by multiple people:</b> When multiple users all need to manage the same service, Account Owned Tokens can remove the bottleneck of requiring a single person to be responsible for all the edits, rotations, and deletions of the tokens. In addition, this guards against any user lifecycle events affecting the service. If the employee that owns the token for your service leaves the company, the service’s token will no longer be based on their permissions.</p><p>2.<b> Cloudflare accounts running any services that need attestable access records beyond user membership:</b> By restricting all of your users from being able to access the API, and consolidating all usable tokens to a single list at the account level, you can ensure that a complete list of all API access can be found in a single place on the dashboard, under “Account API Tokens”.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qtssh6bef5Ne6kugqUUnc/af11e3db733f4f38188988ac42034c26/image9.png" />
          </figure><p>3. <b>Anywhere you’ve created “Service Users”:</b> “Service Users”, or any identity that is meant to allow multiple people to access Cloudflare, are an active threat surface. They are generally highly privileged, and require additional controls (vaulting, password rotation, monitoring) to ensure non-repudiation and appropriate use. If these operations solely require API access, consolidating that access into an Account Owned Token is safe.</p>
    <div>
      <h3>Why/where should I use User Owned Tokens?</h3>
      <a href="#why-where-should-i-use-user-owned-tokens">
        
      </a>
    </div>
    <p>There are a few scenarios/situations where you should continue to use User Owned Tokens:</p><ol><li><p><b>Where programmatic access is done by a single person at an external interface:</b> If a single user has an external interface using their own access privileges at Cloudflare, it still makes sense to use a personal token, so that information access can be traced back to them. (e.g. using a personal token in a data visualization tool that pulls logs from Cloudflare)</p></li><li><p><a href="https://developers.cloudflare.com/api/operations/user-user-details"><b><u>User level operations</u></b></a><b>:</b> Any operations that operate on your own user (e.g. email changes, password changes, user preferences) still require a user level token.</p></li><li><p><b>Where you want to control resources over multiple accounts with the same credential:</b> As of November 2024, Account Owned Tokens are scoped to a single account. In 2025, we want to ensure that we can create cross-account credentials, anywhere that multiple accounts have to be called in the same set of operations should still rely on API Tokens owned by a user.</p></li><li><p><b>Where we currently do not support a given endpoint:</b> We are currently in the process of working through a <a href="https://developers.cloudflare.com/fundamentals/api/get-started/account-owned-tokens/"><u>list of our services</u></a> to ensure that they all support Account Owned Tokens. When interacting with any of these services that are not supported programmatically, please continue to use User Owned Tokens.</p></li><li><p><b>Where you need to do token management programmatically:</b> If you are in an organization that needs to create and delete large numbers of tokens programmatically, please continue to use User Owned Tokens. In late 2024, watch for the “Create Additional Tokens” template on the Account Owned Tokens Page. This template and associated created token will allow for the management of additional tokens.</p></li></ol>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4BGL99WFnh4oOgTFhRY5N3/26bca9fa8851729d4128c2836db62c3c/image6.png" />
          </figure>
    <div>
      <h3>What does this mean for my existing tokens and programmatic access moving forward?</h3>
      <a href="#what-does-this-mean-for-my-existing-tokens-and-programmatic-access-moving-forward">
        
      </a>
    </div>
    <p>We do not plan to decommission User Owned Tokens, as they still have a place in our overall access model and are handy for ensuring user-centric workflows can be implemented.</p><p>As of November 2024, we’re still working to ensure that ALL of our endpoints work with Account Owned Tokens, and we expect to deliver additional token management improvements continuously, with an expected end date of Q3 2025 to cover all endpoints.</p><p>A list of services that support, and do not support, Account Owned Tokens can be found in our <a href="https://developers.cloudflare.com/fundamentals/api/get-started/account-owned-tokens/"><u>documentation.</u></a></p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>If Account Owned Tokens could provide value to your or your organization, documentation is available <a href="https://developers.cloudflare.com/fundamentals/api/get-started/account-owned-tokens/"><u>here</u></a>, and you can give them a try today from the “API Tokens” menu in your dashboard.</p>
    <div>
      <h2>Zaraz Automated Actions makes adding tools to your website a breeze</h2>
      <a href="#zaraz-automated-actions-makes-adding-tools-to-your-website-a-breeze">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5DkxlchIDUZbQ15x0H0usK/eb656617c1c83805bda98c7dfe896bda/image2.png" />
          </figure><p><a href="https://www.cloudflare.com/en-gb/application-services/products/zaraz/"><u>Cloudflare Zaraz</u></a> is a tool designed to manage and optimize third-party tools like analytics, marketing tags, or social media scripts on websites. By loading these third-party services through Cloudflare’s network, Zaraz improves website performance, security, and privacy. It ensures that these external scripts don't slow down page loading times or expose sensitive user data, as it handles them efficiently through Cloudflare's global network, reducing latency and improving the user experience.</p><p>Automated Actions are a new product feature that allow users to easily setup page views, custom events, and e-commerce tracking without going through the tedious process of manually setting up triggers and actions.</p>
    <div>
      <h3>Why we built Automated Actions</h3>
      <a href="#why-we-built-automated-actions">
        
      </a>
    </div>
    <p>An action in Zaraz is a way to tell a third party tool that a user interaction or event has occurred when certain conditions, defined by <a href="https://developers.cloudflare.com/zaraz/custom-actions/create-trigger/"><u>triggers</u></a>, are met. You create actions from within the tools page, associating them with specific tools and triggers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6a0xBA0uG55z4mhVkN0aYl/10101523491c68e4f2eec022737d15d4/image12.png" />
          </figure><p>Setting up a tool in Zaraz has always involved a few steps: <a href="https://developers.cloudflare.com/zaraz/custom-actions/create-trigger/"><u>configuring a trigger</u></a>, <a href="https://developers.cloudflare.com/zaraz/custom-actions/create-action/"><u>linking it to a tool action</u></a> and finally calling <a href="https://developers.cloudflare.com/zaraz/web-api/track/"><code><u>zaraz.track()</u></code></a>. This process allowed advanced configurations with complex rules, and while it was powerful, it occasionally left users confused — why isn’t calling <code>zaraz.track()</code> enough? We heard your feedback, and we’re excited to introduce <b>Zaraz Automated Actions</b>, a feature designed to make Zaraz easier to use by reducing the amount of work needed to configure a tool.</p><p>With Zaraz Automated Actions, you can now automate sending data to your third-party tools without the need to create a manual configuration. Inspired by the simplicity of <a href="https://developers.cloudflare.com/zaraz/web-api/ecommerce/"><code><u>zaraz.ecommerce()</u></code></a>, we’ve extended this ease to all Zaraz events, removing the need for manual trigger and action setup. For example, calling <code>zaraz.track(‘myEvent’)</code> will send your event to the tool without the need to configure any triggers or actions.</p>
    <div>
      <h3>Getting started with Automated Actions</h3>
      <a href="#getting-started-with-automated-actions">
        
      </a>
    </div>
    <p>When adding a new tool in Zaraz, you’ll now see an additional step where you can choose one of three Automated Actions: <b>pageviews</b>, <b>all other events</b>, or <b>ecommerce</b>. These options allow you to specify what kind of events you want to automate for that tool.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LRtb8XpSukCAgmK7uIA5Y/ab11ae9b58f474d08893b496a0eea764/image7.png" />
          </figure><ul><li><p><b>Pageviews</b>: Automatically sends data to the tool whenever someone visits a page on your site, without any manual configuration.</p></li><li><p><b>All other events</b>: Sends all custom events triggered using zaraz.track() to the selected tool, making it easy to automate tracking of user interactions.</p></li><li><p><b>Ecommerce</b>: Automatically sends all e-commerce events triggered via zaraz.ecommerce() to the tool, streamlining your sales and transaction tracking.</p></li></ul><p>These Automated Actions are also available for all your existing tools, which can be toggled on or off from the tool detail page in your Zaraz dashboard. This flexibility allows you to fine-tune which actions are automated based on your needs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xy1tIfYTfOo7p2IUeCS5d/42b26d6cfc4c05d8adc67edfc38ac34c/image10.png" />
          </figure>
    <div>
      <h3>Custom actions for tools without Automated Action support</h3>
      <a href="#custom-actions-for-tools-without-automated-action-support">
        
      </a>
    </div>
    <p>Some tools do not support automated actions because the tool itself does not support page view, custom, or e-commerce events. For such tools you can still create your own custom actions, just like before. Custom actions allow you to configure specific events to send data to your tools based on unique triggers. The process remains the same, and you can follow the detailed steps outlined in our<a href="https://developers.cloudflare.com/zaraz/get-started/create-actions/"> <u>Create Actions guide</u></a>. Remember to set up your trigger first, or choose an existing one, before configuring the action.</p>
    <div>
      <h4>Automatically enrich your payload</h4>
      <a href="#automatically-enrich-your-payload">
        
      </a>
    </div>
    <p>When creating a custom action, it is now easier to send Event Properties using the <b>Include Event Properties field.</b> When this is toggled on, you can automatically send client-specific data with each action, such as user behavior or interaction details. For example, to send an <code>userID</code> property when sending a <code>click</code> event you can do something like this: <code>zaraz.track(‘click’, { userID: “foo” })</code>.</p><p>Additionally, you can enable the <b>Include System Properties</b> option to send system-level information, such as browser, operating system, and more. In your action settings click on “Add Field”, pick the “Include System Properties”, click on confirm and then toggle the field on. </p><p>For a full list of system properties, visit our<a href="https://developers.cloudflare.com/zaraz/reference/context/"> <u>System Properties reference guide</u></a>. These options give you greater flexibility and control over the data you send with custom actions.</p><p>These two fields replace the now deprecated “Enrich Payload” dropdown field.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73nCsNmeG58p6n0ylxMV8E/5cb87b516aaceb38319f9175dc7ccbf3/image5.png" />
          </figure><p>Zaraz Automated Actions marks a significant step forward in simplifying how you manage events across your tools. By automating common actions like page views, e-commerce events, and custom tracking, you can save time and reduce the complexity of manual configurations. Whether you’re leveraging Automated Actions for speed or creating custom actions for more tailored use cases, Zaraz offers the flexibility to fit your workflow. </p><p>We’re excited to see how you use this feature. Please don’t hesitate to reach out to us on Cloudflare <a href="https://discord.gg/2TRr6nSxdd"><u>Zaraz’s Discord Channel</u></a> — we’re always there fixing issues, listening to feedback, and announcing exciting product updates.</p>
    <div>
      <h2>Never miss an update</h2>
      <a href="#never-miss-an-update">
        
      </a>
    </div>
    <p>We’ll continue to share roundup blog posts as we continue to build and innovate. Be sure to follow along on the <a href="https://blog.cloudflare.com/"><u>Cloudflare Blog</u></a> for the latest news and updates.</p> ]]></content:encoded>
            <category><![CDATA[Identity]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zaraz]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Managed Components]]></category>
            <guid isPermaLink="false">5BHU4q5GpzBQ1OLQoUvkKN</guid>
            <dc:creator>Joseph So</dc:creator>
            <dc:creator>Omar Mohammad</dc:creator>
            <dc:creator>Yo'av Moshe</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare account permissions, how to use them, and best practices]]></title>
            <link>https://blog.cloudflare.com/permissions-best-practices/</link>
            <pubDate>Mon, 25 Sep 2023 13:00:43 GMT</pubDate>
            <description><![CDATA[ Cloudflare has a lot of new roles, how should we use them, and how can we stay safe ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In the dynamic landscape of modern web applications and organizations, <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> is critical. Defining who can do what within your Cloudflare account ensures security and efficient workflow management. In order to help meet your organizational needs, whether you are a single developer, a small team, or a larger enterprise, we’re going to cover two changes that we have developed to make it easier to do user management, and best practices on how to use these features, alongside existing features in order to scope everything appropriately into your account, in order to ensure security while you are working with others.</p>
    <div>
      <h3>What are roles?</h3>
      <a href="#what-are-roles">
        
      </a>
    </div>
    <p>In the preceding year, Cloudflare has expanded our list of roles available to everyone from 1 to over 60, and we are continuing to build out more, better roles. We have also made domain scoping a capability for all users. This prompts the question, what are roles, and why do they exist?</p><p>Roles are a set of permissions that exist in a bundle with a name. Every API call that is made to Cloudflare has a required set of permissions, otherwise an API call will return with a 403. We generally group permissions into a role to allow access to a set of capabilities that allow the use of a Cloudflare Product, or that represent everything needed to fulfill a job function.</p><p>As of today, we have two entities that we can assign roles: the first entity is a user, representing a profile, or an actor, which we generally require an email address to represent.</p><p>The second entity is a token, which represents delegation of a subset of a user’s permissions to be used for programmatic purposes.</p>
    <div>
      <h3>What is scope?</h3>
      <a href="#what-is-scope">
        
      </a>
    </div>
    <p>Permissions are useless without an appropriate actor, and a scope. For every action a user can take, they must be directed to the appropriate resource, which is what we refer to as a scope.</p><p>When a user first signs up to Cloudflare, they are provided a Cloudflare user, as well as an account. Accounts can be shared with others. Accounts act as our traditional resource boundary, and granting permissions at the account level means that those permissions apply to all zones, and all other resources within the account.</p><p>Within accounts however, there are zones, R2 Buckets, Workers, and other resources. We are working on expanding the types of scopes that can be set, and as of now, you can scope access to a selective number of zones, or create tokens that only allow access into specified R2 buckets.</p><p>While our list of available roles is going to continue to grow, I want to go into some detail about how to use the roles right now, and how to use them to their full potential</p>
    <div>
      <h3>What are the different types of roles and scopes we have today?</h3>
      <a href="#what-are-the-different-types-of-roles-and-scopes-we-have-today">
        
      </a>
    </div>
    <p>For most of the Cloudflare users and use cases out there, our traditional role model at the account level is the easiest to use. These roles can be viewed by selecting the scope of All domains.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38EHsjMwnRFQvAP3QcqKSB/35e5920d139bce5724b867fe767aac07/pasted-image-0-2.png" />
            
            </figure><p>As of today, there are 40+ Roles available at the account level. These provide access to a capability across the whole account, with no further scoping. Once these roles are provided to a user, they are able to complete a limited set of actions across any zones in your account. We intend to cover off more capabilities in this list, and will continue to add more roles.</p><p>When you want to grant access to a specific zone, or list of zones, the best way to go about that is to use a domain scoped role.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZiZwYsi3qVwc2OAKw2BkT/9bbd1e4d3909b752a5e5ae02f74d5403/pasted-image-0--1--2.png" />
            
            </figure><p>A single domain can be added similar to the above, and granting explicit scope to a domain implicitly denies access to other domains.</p><p>If you are looking to grant access to multiple domains simultaneously, in order to represent all staging zones for example, you can place them into a domain group. These can be revisited and edited within the Configurations → Lists page under Manage Account.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6MWMKuqBFRmpwoQ3HETzVh/8f7eea933db36df07a7cbbc3bc85ffb8/pasted-image-0--2--1.png" />
            
            </figure><p>Best practices for creating domain groups is to group a set of similar domains together, such that you can reuse it for every user on your account.</p>
    <div>
      <h3>Other best practices when assigning memberships</h3>
      <a href="#other-best-practices-when-assigning-memberships">
        
      </a>
    </div>
    <p>It is always best practice to explicitly define what you are granting access to, as Cloudflare’s permissioning system defers to a fail closed design. If you do not grant access to it, they will not have access to it.</p><p>We model all the different types of roles in an additive capacity, and we’re going to move forward with creating more capability specific roles. Multiple roles can be assigned given a scope. We recommend against explicitly “excluding” objects, because it can lead to some complex permission processing.</p><p>An example of this may be your organization’s billing administrator. You may want to grant them both Billing and Analytics, but exclude them from web administration activities by explicitly granting them those two roles.</p><p>Exciting changes you will see from us soon include the capability to “stack” multiple sets of policies on top of one another. We are currently rolling this out, and some users will already have the ability to define a set of permissions for one set of domains, and an increased set of permissions for another.</p><p>This will come in handy if you are managing multiple environments within one account, and want to grant differing levels of access to say a development and staging domain.</p><p>We also recognize that Cloudflare has many resources beyond Accounts and zones, and we are currently experimenting with adding scoping to other objects. As of today, you can specify R2 Tokens to only access certain buckets, and I look forward to adding this capability to more resources.</p>
    <div>
      <h3>Best practices when delegating access to tokens</h3>
      <a href="#best-practices-when-delegating-access-to-tokens">
        
      </a>
    </div>
    <p>Memberships and users tend to use Cloudflare in an interactive capacity, but many organizations use Cloudflare programmatically.</p><p>A new capability we are rolling out to all users soon is the capability to limit API access: on your account as a whole, or on a per-user basis.</p><p>All programmatic access to Cloudflare at this time is managed at a per-user basis, representing a delegation of that user’s access to their set of accounts. Programmatic access is always bounded by a user’s access, and many of our user’s service accounts have a wide set of access that is split into context specific tokens.</p><p>As a Super administrator, if you want to restrict programmatic access to your account, this toggle will become available on the members page.</p><p>We recommend keeping this functionality turned off, unless you explicitly want to grant the ability to use the API to specific users, which can also be controlled via a dropdown per user. We have seen some organizations use this capability to centralize the creation of API Tokens into a single service user.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kuINT3eAjzMFnfi0ma710/7ce085fb9f84af6e221aab92ef971e29/pasted-image-0--3-.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3bjFyWIRtj1c8uYIUPsO3C/7045c27be18bda3242fbb7f2f02fe95a/image4-4.png" />
            
            </figure><p>Cloudflare recommends the use of API Tokens wherever possible. API tokens have the ability to be scoped down to a smaller subset of a user’s access, instead of granting access to all of it.</p><p>When building out a set of permissions for an API Token, we have the same scoping capability that was visible in membership roles.</p><p>Account Scoping:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jGVM9UyeXf9EEusAy4GeO/cd41f101cbf02fec4fb97247359772f8/pasted-image-0--4-.png" />
            
            </figure><p>Domain/Zone Scoping:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1z4TxggVPSxMNT0xep8X3v/379dd3c4ea9c37f97486b9f515bd6b8c/pasted-image-0--5-.png" />
            
            </figure><p>Cloudflare’s roles are meant to provide the flexibility to provide the least amount of privilege possible, in order to keep your Cloudflare resources safe. Recent improvements have included a number of capability specific roles, as well as the ability to lock down API Access. Future improvements will include the ability to grant multiple policies to individual users, as well as more scopes.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>All users are able to use our new roles, and there will be several rolling improvements, including the capability to lock down API access, as well as assign multiple policies to users.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1cBSdLxHXN4Os1d0QUV5Pd</guid>
            <dc:creator>Joseph So</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improved access controls: API access can now be selectively disabled]]></title>
            <link>https://blog.cloudflare.com/improved-api-access-control/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Starting today, it is possible to selectively scope API access to your account to specific users.</p><p>We are making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account. Ensuring users have the least amount of access they need, and maximizing visibility of the access is critical, and our move today is another step in this direction.</p><p>When Cloudflare was first introduced, a single user had access to a single account. As we have been adopted by larger enterprises, the need to maximize access granularity and retain control of an account has become progressively more important. Nowadays, enterprises using Cloudflare could have tens or hundreds of users on an account, some of which need to do account configuration, and some that do not. In addition, to centralize the configuration of the account, some enterprises have a need for service accounts, or those shared between several members of an organization.</p><p>While account owners have always been able to restrict access to an account by their users, they haven’t been able to view the keys and tokens created by their users. Restricting use of the <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">API</a> is the first step in a direction that will allow account owners a single control plane experience to manage their users' access.</p>
    <div>
      <h3>Steps to secure an account</h3>
      <a href="#steps-to-secure-an-account">
        
      </a>
    </div>
    <p>The safest thing to do to reduce risk is to scope every user to the minimal amount of access required, and the second is to monitor what they do with their access.</p><p>While a dashboard login has some degree of non-repudiation, especially when being protected by multiple factors and an SSO configuration, an API key or token can be leaked, and no further authentication factors will block the use of this credential. Therefore, in order to <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">reduce the attack surface</a>, we can limit what the token can do.</p><p>A Cloudflare account owner can now access their members page, and turn API access on or off for specific users, as well as account wide.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ocmwt8Dalaxezxp7Lmk1T/42ac4546eebe9c5e17dd581113b62653/image2-20.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VhkUCtGgA98bAAygeN46t/1aa222e3f3cf46819cf9110345f2061b/image1-30.png" />
            
            </figure><p>This feature is available for our enterprise users starting today.</p>
    <div>
      <h3>Moving forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>On our journey to making the account management experience safer, and more granular, we will continue to increase the level of control account owners have over their accounts. Building these API restrictions is a first step on the way to allowing account-owned API tokens (which will limit the need to have personal tokens), as well as increasing general visibility of tokens among account members.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">7huqx5ceoek1GoQsqsbb7q</guid>
            <dc:creator>Joseph So</dc:creator>
            <dc:creator>Mike Escalante</dc:creator>
        </item>
        <item>
            <title><![CDATA[Now all customers can share access to their Cloudflare account with Role Based Access Controls]]></title>
            <link>https://blog.cloudflare.com/rbac-for-everyone/</link>
            <pubDate>Thu, 29 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Role Based Access Controls are now available for every plan! ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare’s mission is to help build a better Internet. Pair that with our core belief that security is something that should be accessible to everyone and the outcome is a better and safer Internet for all. Previously, our FREE and PAYGO customers didn’t have the flexibility to give someone control of just part of their account, they had to give access to everything.</p><p>Starting today, <a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/">role based access controls (RBAC)</a>, and all of our additional roles will be rolled out to users on every plan! Whether you are a small business or even a single user, you can ensure that you can add users only to parts of Cloudflare you deem appropriate.</p>
    <div>
      <h3>Why should I limit access?</h3>
      <a href="#why-should-i-limit-access">
        
      </a>
    </div>
    <p>It is good practice with security in general to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">limit access</a> to what a team member needs to do a job. Restricting access limits the overall threat surface if a given user was compromised, and ensures that you limit the surface that mistakes can be made.</p><p>If a malicious user was able to gain access to an account, but it only had read access, you’ll find yourself with less of a headache than someone who had administrative access, and could change how your site operates. Likewise, you can prevent users outside their role from accidentally making changes to critical features like firewall or DNS configuration.</p>
    <div>
      <h3>What are roles?</h3>
      <a href="#what-are-roles">
        
      </a>
    </div>
    <p>Roles are a grouping of permissions that make sense together. At Cloudflare, this means grouping permissions together by access to a product suite.</p><p>Cloudflare is a critical piece of infrastructure for customers, and roles ensure that you can give your team the access they need, scoped to what they’ll do, and which products they interact with.</p><p>Once enabled for Role Based Access Controls, by going to “Manage Account” and “Members” in the left sidebar, you’ll have the following list of roles available, which each grant access to disparate subsets of the Cloudflare offering.</p><table>
<thead>
  <tr>
    <th>Role Name</th>
    <th>Role Description</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Administrator</td>
    <td>Can access the full account, except for membership management and billing.</td>
  </tr>
  <tr>
    <td>Administrator Read Only</td>
    <td>Can access the full account in read-only mode.</td>
  </tr>
  <tr>
    <td>Analytics</td>
    <td>Can read Analytics.</td>
  </tr>
  <tr>
    <td>Audit Logs Viewer</td>
    <td>Can view Audit Logs.</td>
  </tr>
  <tr>
    <td>Billing</td>
    <td>Can edit the account’s billing profile and subscriptions.</td>
  </tr>
  <tr>
    <td>Cache Purge</td>
    <td>Can purge the edge cache.</td>
  </tr>
  <tr>
    <td>Cloudflare Access</td>
    <td>Can edit Cloudflare Access policies.</td>
  </tr>
  <tr>
    <td>Cloudflare Gateway</td>
    <td>Can edit Cloudflare Gateway and read Access.</td>
  </tr>
  <tr>
    <td>Cloudflare Images</td>
    <td>Can edit Cloudflare Images assets</td>
  </tr>
  <tr>
    <td>Cloudflare Stream</td>
    <td>Can edit Cloudflare Stream media.</td>
  </tr>
  <tr>
    <td>Cloudflare Workers Admin</td>
    <td>Can edit Cloudflare Workers.</td>
  </tr>
  <tr>
    <td>Cloudflare Zero Trust</td>
    <td>Can edit Cloudflare Zero Trust.</td>
  </tr>
  <tr>
    <td>Cloudflare Zero Trust PII</td>
    <td>Can access Cloudflare Zero Trust PII.</td>
  </tr>
  <tr>
    <td>Cloudflare Zero Trust Read Only</td>
    <td>Can access Cloudflare for Zero Trust read only mode.</td>
  </tr>
  <tr>
    <td>Cloudflare Zero Trust Reporting</td>
    <td>Can access Cloudflare for Zero Trust reporting data.</td>
  </tr>
  <tr>
    <td>DNS</td>
    <td>Can edit DNS records.</td>
  </tr>
  <tr>
    <td>Firewall</td>
    <td>Can edit WAF, IP Firewall, and Zone Lockdown settings.</td>
  </tr>
  <tr>
    <td>HTTP Applications</td>
    <td>Can view and edit HTTP Applications</td>
  </tr>
  <tr>
    <td>HTTP Applications Read</td>
    <td>Can view HTTP Applications</td>
  </tr>
  <tr>
    <td>Load Balancer</td>
    <td>Can edit Load Balancers, Pools, Origins, and Health Checks.</td>
  </tr>
  <tr>
    <td>Log Share</td>
    <td>Can edit Log Share configuration.</td>
  </tr>
  <tr>
    <td>Log Share Reader</td>
    <td>Can read Enterprise Log Share.</td>
  </tr>
  <tr>
    <td>Magic Network Monitoring</td>
    <td>Can view and edit MNM configuration</td>
  </tr>
  <tr>
    <td>Magic Network Monitoring Admin</td>
    <td>Can view, edit, create, and delete MNM configuration</td>
  </tr>
  <tr>
    <td>Magic Network Monitoring Read-Only</td>
    <td>Can view MNM configuration</td>
  </tr>
  <tr>
    <td>Network Services Read (Magic)</td>
    <td>Grants read access to network configurations for Magic services.</td>
  </tr>
  <tr>
    <td>Network Services Write (Magic)</td>
    <td>Grants write access to network configurations for Magic services.</td>
  </tr>
  <tr>
    <td>SSL/TLS, Caching, Performance, Page Rules, and Customization</td>
    <td>Can edit most Cloudflare settings except for DNS and Firewall.</td>
  </tr>
  <tr>
    <td>Trust and Safety</td>
    <td>Can view and request reviews for blocks</td>
  </tr>
  <tr>
    <td>Zaraz Admin</td>
    <td>Can edit Zaraz configuration.</td>
  </tr>
  <tr>
    <td>Zaraz Readonly</td>
    <td>Can read Zaraz configuration.</td>
  </tr>
</tbody>
</table><p>If you find yourself on a team that is growing, you may want to grant firewall and DNS access to a delegated network admin, billing access to your bookkeeper, and Workers access to your developer.</p><p>Each of these roles provides specific access to a portion of your Cloudflare account, scoping them to the appropriate set of products. Even Super Administrator is now available, allowing you to provide this access to somebody without handing over your password and 2FA.</p>
    <div>
      <h3>How to use our roles</h3>
      <a href="#how-to-use-our-roles">
        
      </a>
    </div>
    <p>The first step to using RBAC is an analysis and review of the duties and tasks of your team. When a team member primarily interacts with a specific part of the Cloudflare offering, start off by giving them only access to that part(s). Our roles are built in a way that allows multiple to be assigned to a single user, such that when they require more access, you can grant them an additional role.</p>
    <div>
      <h3>Rollout</h3>
      <a href="#rollout">
        
      </a>
    </div>
    <p>At this point in time, we will be rolling out RBAC over the next few weeks. When the roles become available in your account, head over to our <a href="https://developers.cloudflare.com/fundamentals/account-and-billing/account-setup/account-roles/">documentation</a> to learn about each of the roles in detail.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Dashboard]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5uzqiEawaf1Xm83PMjj6py</guid>
            <dc:creator>Joseph So</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improved Access Control: Domain Scoped Roles are now generally available]]></title>
            <link>https://blog.cloudflare.com/domain-scoped-roles-ga/</link>
            <pubDate>Mon, 19 Sep 2022 13:15:00 GMT</pubDate>
            <description><![CDATA[ Starting today, it is possible to scope your users’ access to specific domains with Domain Scoped Roles becoming generally available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Starting today, it is possible to scope your users’ access to specific domains with Domain Scoped Roles becoming generally available!</p><p>We are making it easier for account owners to manage their team’s access to Cloudflare by allowing user access to be scoped to individual domains. Ensuring users have the least amount of access they need and no more is critical, and Domain Scoped Roles is a major step in this direction. Additionally, with the use of Domain Groups, account owners can grant users access to a group of domains instead of individually. Domains can be added or removed from these groups to automatically update the access of those who have been granted access to the group. This reduces toil in managing user access.</p><p>One of the most common uses we have seen for Domain Scoped Roles is to limit access to production domains to a small set of team members, while still allowing development and pre-production domains to be open to the rest of the team. That way, someone can’t make changes to a production domain unless they are given access.</p><p>We are doing a rollout of this functionality across all Enterprise Cloudflare accounts, and you will receive an email when this functionality is enabled for your account.</p><p>Any existing access on accounts today will remain the same, with the ability to further scope down access where it makes sense. All of our account-wide roles are still available to assign to users.</p>
    <div>
      <h3>How to use Domain Scoped Roles</h3>
      <a href="#how-to-use-domain-scoped-roles">
        
      </a>
    </div>
    <p>Once you have Domain Scoped Roles, here is how to start using it:</p><p>Log in to <a href="https://dash.cloudflare.com/">dash.cloudflare.com</a>, select your account, and navigate to the <a href="https://dash.cloudflare.com/?account=members">members page</a>.</p><p>From this page, you can manage your members' permissions. In this case, we will invite a new user, however you can also modify an existing user’s permissions.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27F6X1PNd29gBrR20FxKsa/7d266867c0be4d1088d77d49fa0f3808/image3-6.png" />
            
            </figure><p>After clicking “Invite”, you will determine which users to invite, multiple users can be invited at the same time. After selecting users, we provide appropriate scope. Within the scope selection list, three options are available: all domains, a specific domain, and a domain group. Selecting all domains continues to grant account wide access, and all of our legacy roles are available at this level of scoping. A specific domain or domain groups provide access to our new domain scoped roles. Finally, with a user and a scope selected, a role (or multiple roles) can be selected to grant appropriate permissions.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1MCJjkvMRm8aJVkzcI4hth/fb555532172a68e3e0c2501c18364766/image4-3.png" />
            
            </figure><p>Before sending the invite, you will be able to confirm the users, scope, and roles.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oiRZj9nsTEWese16bgJEr/9b4646dc875c3b1f02bb45ef5889d3bc/image1-10.png" />
            
            </figure>
    <div>
      <h3>Domain Groups</h3>
      <a href="#domain-groups">
        
      </a>
    </div>
    <p>In addition to manually creating inclusion or exclusion lists per user, account owners can also create Domain Groups to allow granting one or more users to a group of domains. Domain Groups can be created from the member invite flow or directly from Account Configurations → <a href="https://dash.cloudflare.com/?account=configurations/lists">Lists</a>. When creating a domain group, the user selects the domains to include and, from that point on, the group can be used when inviting a user to the account.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We are doing a rollout of this functionality across all Enterprise Cloudflare accounts, and you will receive an email when this functionality is enabled for your account.</p><p>Any existing access on accounts today will remain the same, with the ability to further scope access where you decide. All of our account-wide roles are still available to assign to users.</p><p>If you are an enterprise customer and interested in getting Domain Scoped Roles sooner, please contact your CSM to get enabled! Otherwise, you will receive an email when your account has this feature enabled.</p><p>This announcement represents a step forward in our migration to a new authorization system built for Cloudflare’s scale. This will allow us to expand these capabilities to more products in the future and to create an authorization system that puts customers more in control of their team’s access across all of Cloudflare’s services.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Domain Scoped Roles]]></category>
            <guid isPermaLink="false">2MDVnWekHuwy7Zuu6HDLQq</guid>
            <dc:creator>Joseph So</dc:creator>
        </item>
    </channel>
</rss>