cloudflared access [command options] [arguments...]
Cloudflare Access protects internal resources by securing, authenticating and monitoring access per-user and by application. With Cloudflare Access, only authenticated users with the required permissions are able to reach sensitive resources. The commands provided here allow you to interact with Access protected applications from the command line
Arguments
Name | Description |
---|
command options | |
arguments | |
Subcommands
Name | Description |
---|
login | The login subcommand initiates an authentication flow with your identity provider. The subcommand will launch a browser. For headless systems, a url is provided. Once authenticated with your identity provider, the login command will generate a JSON Web Token (JWT) scoped to your identity, the application you intend to reach, and valid for a session duration set by your administrator. cloudflared stores the token in local storage |
curl | Uninstall the cloudflared launch agent |
token | The token subcommand produces a JWT which can be used to authenticate requests |
tcp | The tcp subcommand sends data over a proxy to the Cloudflare edge |
rdp | The rdp subcommand sends data over a proxy to the Cloudflare edge |
ssh | The ssh subcommand sends data over a proxy to the Cloudflare edge |
smb | The smb subcommand sends data over a proxy to the Cloudflare edge |
ssh-config | Prints an example configuration ~/.ssh/config |
ssh-gen | Generates a short lived certificate for given hostname |
help, h | Shows a list of commands or help for one command |