Viewing docs for Cloudflare v6.13.0
published on Wednesday, Jan 21, 2026 by Pulumi
published on Wednesday, Jan 21, 2026 by Pulumi
Viewing docs for Cloudflare v6.13.0
published on Wednesday, Jan 21, 2026 by Pulumi
published on Wednesday, Jan 21, 2026 by Pulumi
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";
const exampleZeroTrustDeviceSettings = cloudflare.getZeroTrustDeviceSettings({
accountId: "699d98642c564d2e855e9661899b7252",
});
import pulumi
import pulumi_cloudflare as cloudflare
example_zero_trust_device_settings = cloudflare.get_zero_trust_device_settings(account_id="699d98642c564d2e855e9661899b7252")
package main
import (
"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cloudflare.LookupZeroTrustDeviceSettings(ctx, &cloudflare.LookupZeroTrustDeviceSettingsArgs{
AccountId: "699d98642c564d2e855e9661899b7252",
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;
return await Deployment.RunAsync(() =>
{
var exampleZeroTrustDeviceSettings = Cloudflare.GetZeroTrustDeviceSettings.Invoke(new()
{
AccountId = "699d98642c564d2e855e9661899b7252",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.CloudflareFunctions;
import com.pulumi.cloudflare.inputs.GetZeroTrustDeviceSettingsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var exampleZeroTrustDeviceSettings = CloudflareFunctions.getZeroTrustDeviceSettings(GetZeroTrustDeviceSettingsArgs.builder()
.accountId("699d98642c564d2e855e9661899b7252")
.build());
}
}
variables:
exampleZeroTrustDeviceSettings:
fn::invoke:
function: cloudflare:getZeroTrustDeviceSettings
arguments:
accountId: 699d98642c564d2e855e9661899b7252
Using getZeroTrustDeviceSettings
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getZeroTrustDeviceSettings(args: GetZeroTrustDeviceSettingsArgs, opts?: InvokeOptions): Promise<GetZeroTrustDeviceSettingsResult>
function getZeroTrustDeviceSettingsOutput(args: GetZeroTrustDeviceSettingsOutputArgs, opts?: InvokeOptions): Output<GetZeroTrustDeviceSettingsResult>def get_zero_trust_device_settings(account_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetZeroTrustDeviceSettingsResult
def get_zero_trust_device_settings_output(account_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetZeroTrustDeviceSettingsResult]func LookupZeroTrustDeviceSettings(ctx *Context, args *LookupZeroTrustDeviceSettingsArgs, opts ...InvokeOption) (*LookupZeroTrustDeviceSettingsResult, error)
func LookupZeroTrustDeviceSettingsOutput(ctx *Context, args *LookupZeroTrustDeviceSettingsOutputArgs, opts ...InvokeOption) LookupZeroTrustDeviceSettingsResultOutput> Note: This function is named LookupZeroTrustDeviceSettings in the Go SDK.
public static class GetZeroTrustDeviceSettings
{
public static Task<GetZeroTrustDeviceSettingsResult> InvokeAsync(GetZeroTrustDeviceSettingsArgs args, InvokeOptions? opts = null)
public static Output<GetZeroTrustDeviceSettingsResult> Invoke(GetZeroTrustDeviceSettingsInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetZeroTrustDeviceSettingsResult> getZeroTrustDeviceSettings(GetZeroTrustDeviceSettingsArgs args, InvokeOptions options)
public static Output<GetZeroTrustDeviceSettingsResult> getZeroTrustDeviceSettings(GetZeroTrustDeviceSettingsArgs args, InvokeOptions options)
fn::invoke:
function: cloudflare:index/getZeroTrustDeviceSettings:getZeroTrustDeviceSettings
arguments:
# arguments dictionaryThe following arguments are supported:
- Account
Id string
- Account
Id string
- account
Id String
- account
Id string
- account_
id str
- account
Id String
getZeroTrustDeviceSettings Result
The following output properties are available:
- Account
Id string - Disable
For doubleTime - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- External
Emergency boolSignal Enabled - Controls whether the external emergency disconnect feature is enabled.
- External
Emergency stringSignal Fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- External
Emergency stringSignal Interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- External
Emergency stringSignal Url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- Gateway
Proxy boolEnabled - Enable gateway proxy filtering on TCP.
- Gateway
Udp boolProxy Enabled - Enable gateway proxy filtering on UDP.
- Id string
- The provider-assigned unique ID for this managed resource.
- Root
Certificate boolInstallation Enabled - Enable installation of cloudflare managed root certificate.
- Use
Zt boolVirtual Ip - Enable using CGNAT virtual IPv4.
- Account
Id string - Disable
For float64Time - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- External
Emergency boolSignal Enabled - Controls whether the external emergency disconnect feature is enabled.
- External
Emergency stringSignal Fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- External
Emergency stringSignal Interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- External
Emergency stringSignal Url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- Gateway
Proxy boolEnabled - Enable gateway proxy filtering on TCP.
- Gateway
Udp boolProxy Enabled - Enable gateway proxy filtering on UDP.
- Id string
- The provider-assigned unique ID for this managed resource.
- Root
Certificate boolInstallation Enabled - Enable installation of cloudflare managed root certificate.
- Use
Zt boolVirtual Ip - Enable using CGNAT virtual IPv4.
- account
Id String - disable
For DoubleTime - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- external
Emergency BooleanSignal Enabled - Controls whether the external emergency disconnect feature is enabled.
- external
Emergency StringSignal Fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- external
Emergency StringSignal Interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- external
Emergency StringSignal Url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- gateway
Proxy BooleanEnabled - Enable gateway proxy filtering on TCP.
- gateway
Udp BooleanProxy Enabled - Enable gateway proxy filtering on UDP.
- id String
- The provider-assigned unique ID for this managed resource.
- root
Certificate BooleanInstallation Enabled - Enable installation of cloudflare managed root certificate.
- use
Zt BooleanVirtual Ip - Enable using CGNAT virtual IPv4.
- account
Id string - disable
For numberTime - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- external
Emergency booleanSignal Enabled - Controls whether the external emergency disconnect feature is enabled.
- external
Emergency stringSignal Fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- external
Emergency stringSignal Interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- external
Emergency stringSignal Url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- gateway
Proxy booleanEnabled - Enable gateway proxy filtering on TCP.
- gateway
Udp booleanProxy Enabled - Enable gateway proxy filtering on UDP.
- id string
- The provider-assigned unique ID for this managed resource.
- root
Certificate booleanInstallation Enabled - Enable installation of cloudflare managed root certificate.
- use
Zt booleanVirtual Ip - Enable using CGNAT virtual IPv4.
- account_
id str - disable_
for_ floattime - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- external_
emergency_ boolsignal_ enabled - Controls whether the external emergency disconnect feature is enabled.
- external_
emergency_ strsignal_ fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- external_
emergency_ strsignal_ interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- external_
emergency_ strsignal_ url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- gateway_
proxy_ boolenabled - Enable gateway proxy filtering on TCP.
- gateway_
udp_ boolproxy_ enabled - Enable gateway proxy filtering on UDP.
- id str
- The provider-assigned unique ID for this managed resource.
- root_
certificate_ boolinstallation_ enabled - Enable installation of cloudflare managed root certificate.
- use_
zt_ boolvirtual_ ip - Enable using CGNAT virtual IPv4.
- account
Id String - disable
For NumberTime - Sets the time limit, in seconds, that a user can use an override code to bypass WARP.
- external
Emergency BooleanSignal Enabled - Controls whether the external emergency disconnect feature is enabled.
- external
Emergency StringSignal Fingerprint - The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the externalemergencysignal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value.
- external
Emergency StringSignal Interval - The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds.
- external
Emergency StringSignal Url - The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host.
- gateway
Proxy BooleanEnabled - Enable gateway proxy filtering on TCP.
- gateway
Udp BooleanProxy Enabled - Enable gateway proxy filtering on UDP.
- id String
- The provider-assigned unique ID for this managed resource.
- root
Certificate BooleanInstallation Enabled - Enable installation of cloudflare managed root certificate.
- use
Zt BooleanVirtual Ip - Enable using CGNAT virtual IPv4.
Package Details
- Repository
- Cloudflare pulumi/pulumi-cloudflare
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
cloudflareTerraform Provider.
Viewing docs for Cloudflare v6.13.0
published on Wednesday, Jan 21, 2026 by Pulumi
published on Wednesday, Jan 21, 2026 by Pulumi
