cloudflared access [command options] [arguments...]

Cloudflare Access protects internal resources by securing, authenticating and monitoring access per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are able to reach sensitive resources. The commands provided here allow you to interact with Access protected applications from the command line

Arguments

NameDescription
command options
arguments

Subcommands

NameDescription
loginThe login subcommand initiates an authentication flow with your identity provider. The subcommand will launch a browser. For headless systems, a url is provided. Once authenticated with your identity provider, the login command will generate a JSON Web Token (JWT) scoped to your identity, the application you intend to reach, and valid for a session duration set by your administrator. cloudflared stores the token in local storage
curlUninstall the cloudflared launch agent
tokenThe token subcommand produces a JWT which can be used to authenticate requests
tcpThe tcp subcommand sends data over a proxy to the Cloudflare edge
rdpThe rdp subcommand sends data over a proxy to the Cloudflare edge
sshThe ssh subcommand sends data over a proxy to the Cloudflare edge
smbThe smb subcommand sends data over a proxy to the Cloudflare edge
ssh-configPrints an example configuration ~/.ssh/config
ssh-genGenerates a short lived certificate for given hostname
help, hShows a list of commands or help for one command