Languages
use cases
Modernize applications
Modernize security
Modernize networks
CxO topics
Industries
Resources
Engage
products
SASE and workspace security
Application security
Application performance
Networking
plans & pricing
Global services
documentation
Products
Artificial Intelligence
Compute
Media
Storage & database
Plans & Pricing
Partnership Types
Build
Explore
Support
Company info
Trust, Privacy, & Safety
Public Interest
Cloudflare Access
How it works
Analyst reports
Use cases
Pricing
Replace legacy VPNs with zero trust network access (ZTNA)
Provide identity-first, quantum-safe access to private applications and infrastructure. Govern connections between your workforce, AI agents, and internal data.
Make on-premises applications as easy to use as SaaS apps. ZTNA reduces remote access support tickets by 80% compared to a VPN.
Simplify the setup and operation of ZTNA with one-time integrations, composable software connectors, and unified Zero Trust policies.
Shrink your attack surface by enforcing context-based, least-privilege access policies for every resource.
Shield critical applications and high-risk user groups first — then expand cloud-native ZTNA to protect your infrastructure and MCP servers.
Cloudflare Access verifies and secures employee and third-party access across all of your self-hosted, SaaS, and non-web applications, including AI tools, helping mitigate risk and ensure a smooth user experience.
It checks granular context like identity and device posture for every request to provide fast, reliable access across your business.
ANALYST RECOGNITION
“Cloudflare Access was a game-changer for Bitso. It made zero trust much easier. We now manage access to internal resources more efficiently, ensuring the right people have the right level of access to the right resources, regardless of their location device, or network.”
Cybersecurity Lead, Bitso
TOP ACCESS USE CASES
Offload critical applications for better security and an improved user experience.
Authenticate third-party users (like contractors) with clientless options, social identity providers, and more.
Ensure privileged technical users can access critical infrastructure — without performance trade-offs.
Free Plan
forever
Best for teams under 50 users or enterprise proof-of-concept tests.
Pay-as-you-go
per user/month (paid annually)
Best for teams over 50 users solving narrow SSE use cases and that do not require enterprise support services.
Contract Plan
Best for organizations building toward a full-featured SSE or SASE deployment that also desire maximum support.
Access controls (included in zero trust platform)
No user limit
Support options vary by plan type. Various professional advisory and hands-on implementation services available as add-ons to Contract plans.
Chat and ticket support
Phone, chat, and ticket support; professional services available (add-on)
Custom application and private network policies, plus policy tester. Supports temporary authentication, purpose justification, and any IdP-provided auth method.
Protect self-hosted, SaaS, and non-web (SSH, VNC, RDP) apps, internal IPs and hostnames, or any arbitrary L4–7 TCP or UDP traffic.
Authenticate via enterprise and social IdPs, including multiple IdPs concurrently. Can also use generic SAML and OIDC connectors.
Configure contextual access based on IdP groups, geolocation, device posture, session duration, external APIs, etc.
Verify device posture using third-party endpoint protection provider integrations.
Clientless access for web apps and browser-based SSH or VNC.
Privileged SSH and VNC access through in-browser terminal.
Split tunneling for local or VPN connectivity.
Customizable app launcher for all apps, including bookmarks to apps outside of Access.
Service token support for automated services.
Configure local domain fallback. Define an internal DNS resolver to resolve private network requests.
Automate deployment of Cloudflare resources and connections.
Certificate-based auth for IoT and other mTLS use cases.
Core capabilities
50 user limit
Dependable service level agreements (SLA) for paid plans with 100% uptime and reliable service you can trust.Learn more >
100% uptime guarantee (SLA)
Community forums and Discord server
Zero Trust logs are stored for a varying period of time based on the plan type and service used. Contract users can export logs via Logpush.See tech docs >
up to 24 hours
up to 30 days
Up to 6 months; Logpush to SIEM/cloud storage
Securely connects resources to Cloudflare without a publicly routable IP address. Does not require VM infrastructure and has no throughput limitations.See tech docs >
Securely and privately sends traffic from end user devices to Cloudflare’s global network. Enables capabilities like building device posture rules or enforcing filtering policies anywhere. Self-enroll or deploy via MDM.See tech docs >
ZTNA provides granular identity- and context-based access to all your internal self-hosted, SaaS, and non-web (e.g., SSH) resources.See tech docs >
SWG protects against ransomware, phishing, and other threats using L4–7 network, DNS, and HTTP filtering policies for faster, safer Internet browsing.See tech docs >
Provides user-centric visibility into device, network, and application performance across your zero trust organization.See tech docs >
Provides network traffic visibility and real-time alerts for unified insights into network activity. Available for free to everyone.See tech docs >
CASB continuously monitors SaaS apps at rest to detect potential data exposure due to misconfigurations or weak posture findings.See tech docs >
Up to 2 read-only API integrations
Unlimited out-of-band integrations (add-on)
DLP detects sensitive data in transit and at rest across web, SaaS and private apps with controls or remediation guides to stop leakage or exposure.See tech docs >
Limited predefined profiles
Full-featured (add-on)
Free and pay-as-you-go plan: Free for the first 10 GB, $1 per GB per month afterEnterprise: Custom pricing
Add on
RBI layers additional threat defense and data protection controls across browsing activities by running all browser code on Cloudflare's global network.See tech docs >
Add-on
Email security helps block and isolate multi-channel phishing threats, including malware and business email compromise.See tech docs >
Cloudflare One is our single-vendor SASE platform that converges zero trust security services from the plans above with network services — including Magic WAN and Firewall.See tech docs >
Add-on (See next pricing tab)
Access controls
Protect self-hosted, SaaS, and non-web (SSH, VNC, RDP) apps, internal IPs and hostnames, or any arbitrary L4-7 TCP or UDP traffic.
Clientless access for web apps and browser-based SSH or VNC
Privileged SSH and VNC access through in-browser terminal
Split tunneling for local or VPN connectivity
Customizable app launcher for all apps, including bookmarks to apps outside of Access
Service token support for automated services
Certificate-based auth for IoT and other mTLS use cases
Threat protection
Block by ransomware, phishing, DGA domains, DNS tunneling, C2 & botnet, and more.
Filter by security or content category. Deploy via our device client or via routers for locations.
Control traffic based on source, destination country, domains, hosts, HTTP methods, URLs, and more. Unlimited TLS 1.3 inspection.
Allow or block traffic based on ports, IPs, and TCP/UDP protocols.
Scan uploaded / downloaded files across types (PDFs, ZIP, RAR, etc.)
Detection via our own machine learning algorithms and third-party threat feeds.
All functionality available for IPv4 and IPv6 connectivity.
Create network policies to manage and monitor SSH access to your applications
Secure connectivity for DNS filtering directly from offices.
Up to 3 locations
Up to 50 locations
Up to 250 locations
Render all browser code at the edge, instead of locally, to mitigate threats. Deploy with or without a device client. Selectively control what activity to isolate and when.
Stop phishing and business email compromise.
Apply HTTP policies at the browser level by configuring a PAC file. Apply filters without deploying client software on user devices.
Dedicated range of IPs (IPv4 or IPv6) geolocated to one or more Cloudflare network locations.
Data protection
Set least-privilege policies per application to ensure users only access data they need.
Allow or block uploads / downloads of files based on Mime type.
Allow or block traffic to specific apps or app types.
Add Cloudflare CASB to detect if misconfigurations in SaaS applications leak sensitive data. View full list of supported integrations.
Unlimited out-of-band integrations
Inspect HTTP(S) traffic and files for the presence of sensitive data. Free tier includes predefined profiles like financial info, while full-featured Contract plans also include custom profiles, custom datasets, OCR, DLP logs, and more.
Restrict download, upload, copy/paste, keyboard input, and printing actions within isolated web pages and applications. Prevent data leakage onto local devices, and control user inputs on suspicious websites. Deploy with or without a device client.
SaaS app protection
All access controls, data controls, and threat protection capabilities (as outlined in prior sections) apply consistently across SaaS apps.
Allow traffic only to corporate tenants of SaaS apps. Prevent leakage of sensitive data to personal or consumer tenants.
Review apps your end users visit. Set approval status for those apps.
Integrate with your must used SaaS apps (e.g. Google Workspace, Microsoft 365) to scan, detect, and monitor for security issues. View full list of supported integrations.
API integrations continuously monitor SaaS apps for suspicious activities, data exfiltration, unauthorized access, and more.
Identify inappropriate file sharing behaviors within your most used SaaS apps.
Discover misconfigurations and incorrect user permissions within SaaS apps. Immediately action surfaced security findings with step-by-step remediation guides.
Stop phishing and business email compromise with Cloudflare’s email security.
Visibility
On Contract plans, DNS logs are stored 6 months, and HTTP and network logs for 30 days.
24 hours
30 days
6 months
Comprehensive details for all requests, users, and devices, including block reasons. Block policy decisions are stored for a week, and authentication logs for 6 months.
Audit logs for the connection status of tunnels and for when a new DNS record is registered for an app.
Track usage and review approval status across applications end users visit.
Full replay of all commands run during an SSH session. Provides SSH visibility at a network layer.
Passively monitor private network traffic to catalog discovered apps and users who access them.
By default, logs will not store any employee PII (source IP, user email, user ID, etc.) and be unavailable to all roles in your organization.
Provides predictive, historical, and real time intelligence around application outages, network issues, and performance slow-downs to keep users productive. View capabilities
Top-level findings only
Detailed findings
Network performance and connectivity on-ramps
Anycast network spanning 330 cities in 125 countries with 405 Tbps of network edge capacity
13,000 interconnects, including major ISPs, cloud services, & enterprises
Network architected so that every service operating at the edge is built to run in every data center and available to every customer.
All traffic is processed in a single pass at the data center closest to its source. No backhauling.
Optimized routes to avoid congestion issues.
Available across all major OSes (Win, Mac, iOS, Android, Linux, ChromeOS).
Default mode sends traffic through WireGuard tunnels to enable the full range of security functionality.Use DoH mode to only enforce DNS filtering policies, or use proxy mode to filter traffic only to specific apps.
Deploy to your entire device fleet via MDM tools. Or, users can download the device client themselves to self-enroll.
Connect resources to Cloudflare without a publicly routable IP address. Deploy via UI, API, or CLI.
Blog
White paper
Cloudflare Access is a zero trust network access (ZTNA) solution designed to secure access for employees and contractors across self-hosted, SaaS, and non-web applications, eliminating the need for a traditional VPN.
Cloudflare Access makes on-premises applications as user-friendly as SaaS applications. It has been shown to reduce remote access support tickets by 80% compared to using a VPN, freeing up internal IT teams to focus on more productive tasks.
Cloudflare Access strengthens security by verifying user identity and device health for every request. It helps to minimize the attack surface by enforcing least-privilege access policies for all resources.
Yes, Cloudflare Access simplifies managing third-party access by offering clientless options and integration with social identity providers for authenticating third-party users such as contractors.
Cloudflare Access empowers developers by ensuring that privileged technical users can securely access critical infrastructure without experiencing performance bottlenecks.