Menu
Cloudflare Blog·March 4, 2026

Cloudflare's Gateway Authorization Proxy for Clientless Identity Enforcement

Cloudflare's Gateway Authorization Proxy addresses the challenge of enforcing granular security policies and user identity for unmanaged devices that cannot install endpoint software. It shifts identity verification from the device to the network edge, using browser native proxy capabilities and signed JWT cookies to authenticate users via Cloudflare Access before applying Gateway filtering rules. This system design enables identity-aware logging and policy enforcement for diverse environments like VDI, M&A, and highly regulated industries.

Read original on Cloudflare Blog

The article introduces Cloudflare's Gateway Authorization Proxy, a solution designed to extend Zero Trust security principles to unmanaged devices where installing a client application (like the Cloudflare One Client) is not feasible. This is a common architectural challenge in various enterprise scenarios, including managing virtual desktops, integrating systems during mergers and acquisitions, or adhering to strict compliance regulations that prohibit endpoint software installations.

The Problem: IP-based Identity Limitations

Prior solutions for routing traffic through Cloudflare for filtering relied heavily on static IP addresses for user identification. While this provided basic access control, it suffered from several drawbacks common to IP-based authentication in dynamic environments:

  • Anonymous Logs: Lack of specific user identity made auditing and forensic analysis difficult.
  • Brittle Policies: User location changes or device switching would invalidate IP-based rules, requiring manual updates.
  • Manual Maintenance: Organizations had to self-host and manage Proxy Auto-Configuration (PAC) files, adding operational overhead.

Solution: Authorization Proxy with Identity Integration

The Gateway Authorization Proxy fundamentally shifts the identity challenge to the network edge. Instead of relying solely on source IP, it integrates with Cloudflare Access to verify user identity before traffic proceeds to Gateway filtering. This approach leverages browser-native proxy capabilities combined with Cloudflare's global network to provide a clientless identity enforcement mechanism. Key benefits include:

  • True Identity Integration: Logs now associate traffic with specific users, enabling granular, user-centric policies (e.g., "only Finance team members can access accounting tools").
  • Multiple Identity Providers (IdPs): Supports displaying multiple login options, crucial for complex organizational structures or M&A scenarios.
  • Simplified Billing: User-based licensing aligns with existing Cloudflare One Client models.

Technical Implementation: How Identity is Tracked

The core of the identity tracking mechanism relies on signed JWT cookies. When a user first attempts to access a new domain via the proxy, they are redirected to Cloudflare Access for authentication. If already authenticated with Access, a domain-specific secure token (JWT cookie) is generated. If not, the user is redirected to their configured IdP(s) to log in. Subsequent requests to the same domain or its subdomains utilize this cookie for instant authorization, making the process largely invisible to the user due to the speed of Cloudflare's edge network.

💡

System Design Implication: Decoupling Identity from Network Location

This design pattern effectively decouples user identity from network location (IP address). By leveraging an intermediary proxy that can perform out-of-band authentication and maintain session state via secure cookies, organizations can achieve a more robust and flexible security posture, especially for unmanaged devices or dynamic user environments. This is a critical component in Zero Trust architectures.

Zero TrustNetwork ProxyIdentity ManagementAuthenticationCloudflareEdge ComputingClientless SecurityJWT

Comments

Loading comments...