Cloudflare Docs
Cloudflare Zero Trust
Edit this page
Report an issue with this page
Log into the Cloudflare dashboard
Set theme to dark (⇧+D)

Glossary

Review definitions for Cloudflare Zero Trust terms.

TermDefinition
Access groupA set of rules that can be configured once and then quickly applied across many Access applications.
active zoneA DNS zone that is active on Cloudflare requires changing its nameservers to Cloudflare’s for management.
App LauncherThe App Launcher portal provides end users with a single dashboard to open applications secured by Cloudflare Zero Trust.
applicationThe resource protected by Cloudflare Zero Trust, which can be a subdomain, a path, or a SaaS application.
application tokenA piece of data that grants a user access to a specific Access application for a period of time. Can be stored in a browser cookie or passed to the application in place of a normal password.
Authenticated Origin PullsAuthenticated Origin Pulls allow origin web servers to validate that a web request came from Cloudflare using TLS client certificate authentication.
captive portalA login screen shown to users when they connect to a public Wi-Fi. Captive portals typically occur in places such as airports, cafes, and hotels.
CGNAT IPA unique, virtual IP address assigned to each WARP device from the 100.96.0.0/12 range. You can view the CGNAT IP for a device on its My Team > Devices page.
cipher suiteA set of encryption algorithms for establishing a secure communications connection. There are several cipher suites in wide use, and a client and server agree on the cipher suite to use when establishing the TLS connection. Support of multiple cipher suites allows compatibility across various clients.
Cloudflare AccessCloudflare Access replaces corporate VPNs with Cloudflare’s network. It verifies attributes such as identity and device posture to grant users secure access to internal tools.
Cloudflare Browser IsolationCloudflare Browser Isolation seamlessly executes active webpage content in a secure isolated browser to protect users from zero-day attacks, malware, and phishing.
Cloudflare CASBCloudflare CASB provides comprehensive visibility and control over SaaS apps to prevent data leaks and compliance violations. It helps detect insider threats, shadow IT, risky data sharing, and bad actors.
Cloudflare Data Loss Prevention (DLP)Cloudflare Data Loss Prevention (DLP) allows you to scan your web traffic and SaaS applications for the presence of sensitive data such as social security numbers, financial information, secret keys, and source code.
Cloudflare DEXCloudflare Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Zero Trust organization.
Cloudflare GatewayCloudflare Gateway is a modern next-generation firewall between your user, device, or network and the public Internet. It includes DNS filtering to inspect and apply policies to all Internet-bound DNS queries.
Cloudflare One AgentThe name of the Cloudflare WARP client app on iOS and Android devices.
Cloudflare TunnelCloudflare Tunnel uses software agents (cloudflared or WARP Connector) to establish a secure connection between a private network and Cloudflare.
Cloudflare Zero TrustCloudflare Zero Trust provides the power of Cloudflare’s global network to your internal teams and infrastructure. It empowers users with secure, fast, and seamless access to any device on the Internet.
cloudflaredThe software powering Cloudflare Tunnel. It runs on origin servers to connect applications or private networks to Cloudflare.
cloudflared replicaAn additional instance of cloudflared that points to the same Cloudflare Tunnel. It ensures that your network remains online in case a single host running cloudflared goes down.
daemonA program that performs tasks without active management or maintenance.
device postureA way to evaluate the security of a user’s device, for example by verifying its serial number or checking if it has the latest software updates.
device profileA collection of WARP client settings applied to a specific set of devices in your organization.
DNS filteringDNS filtering uses the Domain Name System to block malicious websites and filter out harmful content, enhancing security and access control.
DNS locationDNS locations are a collection of DNS endpoints which can be mapped to physical entities such as offices, homes, or data centers.
DNS over HTTPSDNS over HTTPS (DoH) is a standard for encrypting DNS traffic via the HTTPS protocol, preventing tracking and spoofing of DNS queries.
DNS over TLSDNS over TLS (DoT) is a standard for encrypting DNS traffic using its own port (853) and TLS encryption.
DNS serverDNS servers translate human-readable domain names into IP addresses, eliminating the need to remember complex IP addresses.
DoH subdomainA unique DoH subdomain for each DNS location in Cloudflare Zero Trust used in WARP client settings.
EDNS Client Subnet (ECS)

ECS is a DNS extension that enables recursive DNS resolvers to include client IP address information in their DNS queries.

Not all resolvers use ECS but, if they do, usually a part of the IP address is omitted. Sending ECS headers is generally intended to reduce latency and speed up content delivery in connection to CDNs and load balancers. The ECS mechanism is specified in RFC 7871.

hostnameThe name given to a server or node on a network, often the public DNS name of a server.
identity providerAn identity provider (IdP) stores and manages users’ digital identities, enabling single sign-on and authentication for multiple applications.
JSON web tokenA compact way to securely transmit information between parties as a JSON object, often used for authentication.
locally-managed tunnelA Cloudflare Tunnel that was created by running cloudflared tunnel create <NAME> on the command line. Tunnel configuration is stored in your local cloudflared directory.
managed networkA network location, such as an office, that is associated with a specific WARP client device profile.
MDM fileA Mobile Device Management (MDM) file is a configuration file that allows organizations to manage the software, settings, and certificates installed on their devices.
MFAMulti-factor authentication (MFA) checks multiple aspects of a user’s identity, not only their username and password, before allowing them access to an application.
mTLS (mutual TLS)MTLS is a common security practice that uses TLS certificates to ensure that traffic between a client and server is secure and trusted in both directions.
OAuthA protocol for authorizing users, allowing them to perform actions and view data on different platforms without sharing credentials.
OIDCOpenID Connect (OIDC) is an identity authentication protocol built on top of OAuth 2.0. It is used verifying user identity and obtaining basic profile information.
origin certificateA Cloudflare Origin Certificate is a free SSL/TLS certificate issued by Cloudflare that can be installed on your origin server to facilitate making sure your data is encrypted in transit from Cloudflare to your origin server using HTTPS.
PAC fileA file containing a JavaScript function which can instruct a browser to forward traffic to a proxy server instead of directly to the destination server.
policyA set of rules that regulate network activity, such as login access and website reachability.
RDPRemote Desktop Protocol (RDP) allows remote desktop connections to a computer, often used on Windows and Mac operating systems.
remotely-managed tunnelA Cloudflare Tunnel that was created in Zero Trust under Networks > Tunnels. Tunnel configuration is stored in Cloudflare, which allows you to manage the tunnel from the dashboard or using the API.
root certificateA root certificate is generated by a CA and is used to sign certificates. Every browser includes a root store of trusted root certificates. Any certificate signed with the private key of a root certificate is automatically trusted by a browser.
SafeSearchSafeSearch is a feature of search engines that filters explicit or offensive content from search results.
SAMLSecurity Assertion Markup Language (SAML) enables single sign-on and authentication for multiple applications.
SASESecure Access Service Edge (SASE) is a cloud-based security model bundling networking and security functions.
SCIMSystem for Cross-domain Identity Management (SCIM) is an open standard protocol that allows identity providers (such as Okta or Microsoft Entra ID) to synchronize user identity information with cloud applications and services.