published on Saturday, May 2, 2026 by Pulumi
published on Saturday, May 2, 2026 by Pulumi
Accepted Permissions
Access: Organizations, Identity Providers, and Groups ReadAccess: Organizations, Identity Providers, and Groups RevokeAccess: Organizations, Identity Providers, and Groups Write
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";
const exampleZeroTrustOrganization = new cloudflare.ZeroTrustOrganization("example_zero_trust_organization", {
zoneId: "zone_id",
allowAuthenticateViaWarp: true,
authDomain: "test.cloudflareaccess.com",
autoRedirectToIdentity: true,
customPages: {
forbidden: "699d98642c564d2e855e9661899b7252",
identityDenied: "699d98642c564d2e855e9661899b7252",
},
denyUnmatchedRequests: true,
denyUnmatchedRequestsExemptedZoneNames: ["example.com"],
isUiReadOnly: true,
loginDesign: {
backgroundColor: "#c5ed1b",
footerText: "This is an example description.",
headerText: "This is an example description.",
logoPath: "https://example.com/logo.png",
textColor: "#c5ed1b",
},
mfaConfig: {
allowedAuthenticators: [
"totp",
"biometrics",
"security_key",
],
amrMatchingSessionDuration: "12h",
requiredAaguids: "2fc0579f-8113-47ea-b116-bb5a8db9202a",
sessionDuration: "24h",
},
mfaRequiredForAllApps: false,
mfaSshPivKeyRequirements: {
pinPolicy: "always",
requireFipsDevice: true,
sshKeySizes: [
256,
2048,
],
sshKeyTypes: [
"ecdsa",
"rsa",
],
touchPolicy: "always",
},
name: "Widget Corps Internal Applications",
sessionDuration: "24h",
uiReadOnlyToggleReason: "Temporarily turn off the UI read only lock to make a change via the UI",
userSeatExpirationInactiveTime: "730h",
warpAuthSessionDuration: "24h",
});
import pulumi
import pulumi_cloudflare as cloudflare
example_zero_trust_organization = cloudflare.ZeroTrustOrganization("example_zero_trust_organization",
zone_id="zone_id",
allow_authenticate_via_warp=True,
auth_domain="test.cloudflareaccess.com",
auto_redirect_to_identity=True,
custom_pages={
"forbidden": "699d98642c564d2e855e9661899b7252",
"identity_denied": "699d98642c564d2e855e9661899b7252",
},
deny_unmatched_requests=True,
deny_unmatched_requests_exempted_zone_names=["example.com"],
is_ui_read_only=True,
login_design={
"background_color": "#c5ed1b",
"footer_text": "This is an example description.",
"header_text": "This is an example description.",
"logo_path": "https://example.com/logo.png",
"text_color": "#c5ed1b",
},
mfa_config={
"allowed_authenticators": [
"totp",
"biometrics",
"security_key",
],
"amr_matching_session_duration": "12h",
"required_aaguids": "2fc0579f-8113-47ea-b116-bb5a8db9202a",
"session_duration": "24h",
},
mfa_required_for_all_apps=False,
mfa_ssh_piv_key_requirements={
"pin_policy": "always",
"require_fips_device": True,
"ssh_key_sizes": [
256,
2048,
],
"ssh_key_types": [
"ecdsa",
"rsa",
],
"touch_policy": "always",
},
name="Widget Corps Internal Applications",
session_duration="24h",
ui_read_only_toggle_reason="Temporarily turn off the UI read only lock to make a change via the UI",
user_seat_expiration_inactive_time="730h",
warp_auth_session_duration="24h")
package main
import (
"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cloudflare.NewZeroTrustOrganization(ctx, "example_zero_trust_organization", &cloudflare.ZeroTrustOrganizationArgs{
ZoneId: pulumi.String("zone_id"),
AllowAuthenticateViaWarp: pulumi.Bool(true),
AuthDomain: pulumi.String("test.cloudflareaccess.com"),
AutoRedirectToIdentity: pulumi.Bool(true),
CustomPages: &cloudflare.ZeroTrustOrganizationCustomPagesArgs{
Forbidden: pulumi.String("699d98642c564d2e855e9661899b7252"),
IdentityDenied: pulumi.String("699d98642c564d2e855e9661899b7252"),
},
DenyUnmatchedRequests: pulumi.Bool(true),
DenyUnmatchedRequestsExemptedZoneNames: pulumi.StringArray{
pulumi.String("example.com"),
},
IsUiReadOnly: pulumi.Bool(true),
LoginDesign: &cloudflare.ZeroTrustOrganizationLoginDesignArgs{
BackgroundColor: pulumi.String("#c5ed1b"),
FooterText: pulumi.String("This is an example description."),
HeaderText: pulumi.String("This is an example description."),
LogoPath: pulumi.String("https://example.com/logo.png"),
TextColor: pulumi.String("#c5ed1b"),
},
MfaConfig: &cloudflare.ZeroTrustOrganizationMfaConfigArgs{
AllowedAuthenticators: pulumi.StringArray{
pulumi.String("totp"),
pulumi.String("biometrics"),
pulumi.String("security_key"),
},
AmrMatchingSessionDuration: pulumi.String("12h"),
RequiredAaguids: pulumi.String("2fc0579f-8113-47ea-b116-bb5a8db9202a"),
SessionDuration: pulumi.String("24h"),
},
MfaRequiredForAllApps: pulumi.Bool(false),
MfaSshPivKeyRequirements: &cloudflare.ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs{
PinPolicy: pulumi.String("always"),
RequireFipsDevice: pulumi.Bool(true),
SshKeySizes: pulumi.IntArray{
pulumi.Int(256),
pulumi.Int(2048),
},
SshKeyTypes: pulumi.StringArray{
pulumi.String("ecdsa"),
pulumi.String("rsa"),
},
TouchPolicy: pulumi.String("always"),
},
Name: pulumi.String("Widget Corps Internal Applications"),
SessionDuration: pulumi.String("24h"),
UiReadOnlyToggleReason: pulumi.String("Temporarily turn off the UI read only lock to make a change via the UI"),
UserSeatExpirationInactiveTime: pulumi.String("730h"),
WarpAuthSessionDuration: pulumi.String("24h"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;
return await Deployment.RunAsync(() =>
{
var exampleZeroTrustOrganization = new Cloudflare.Index.ZeroTrustOrganization("example_zero_trust_organization", new()
{
ZoneId = "zone_id",
AllowAuthenticateViaWarp = true,
AuthDomain = "test.cloudflareaccess.com",
AutoRedirectToIdentity = true,
CustomPages = new Cloudflare.Inputs.ZeroTrustOrganizationCustomPagesArgs
{
Forbidden = "699d98642c564d2e855e9661899b7252",
IdentityDenied = "699d98642c564d2e855e9661899b7252",
},
DenyUnmatchedRequests = true,
DenyUnmatchedRequestsExemptedZoneNames = new[]
{
"example.com",
},
IsUiReadOnly = true,
LoginDesign = new Cloudflare.Inputs.ZeroTrustOrganizationLoginDesignArgs
{
BackgroundColor = "#c5ed1b",
FooterText = "This is an example description.",
HeaderText = "This is an example description.",
LogoPath = "https://example.com/logo.png",
TextColor = "#c5ed1b",
},
MfaConfig = new Cloudflare.Inputs.ZeroTrustOrganizationMfaConfigArgs
{
AllowedAuthenticators = new[]
{
"totp",
"biometrics",
"security_key",
},
AmrMatchingSessionDuration = "12h",
RequiredAaguids = "2fc0579f-8113-47ea-b116-bb5a8db9202a",
SessionDuration = "24h",
},
MfaRequiredForAllApps = false,
MfaSshPivKeyRequirements = new Cloudflare.Inputs.ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs
{
PinPolicy = "always",
RequireFipsDevice = true,
SshKeySizes = new[]
{
256,
2048,
},
SshKeyTypes = new[]
{
"ecdsa",
"rsa",
},
TouchPolicy = "always",
},
Name = "Widget Corps Internal Applications",
SessionDuration = "24h",
UiReadOnlyToggleReason = "Temporarily turn off the UI read only lock to make a change via the UI",
UserSeatExpirationInactiveTime = "730h",
WarpAuthSessionDuration = "24h",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.ZeroTrustOrganization;
import com.pulumi.cloudflare.ZeroTrustOrganizationArgs;
import com.pulumi.cloudflare.inputs.ZeroTrustOrganizationCustomPagesArgs;
import com.pulumi.cloudflare.inputs.ZeroTrustOrganizationLoginDesignArgs;
import com.pulumi.cloudflare.inputs.ZeroTrustOrganizationMfaConfigArgs;
import com.pulumi.cloudflare.inputs.ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var exampleZeroTrustOrganization = new ZeroTrustOrganization("exampleZeroTrustOrganization", ZeroTrustOrganizationArgs.builder()
.zoneId("zone_id")
.allowAuthenticateViaWarp(true)
.authDomain("test.cloudflareaccess.com")
.autoRedirectToIdentity(true)
.customPages(ZeroTrustOrganizationCustomPagesArgs.builder()
.forbidden("699d98642c564d2e855e9661899b7252")
.identityDenied("699d98642c564d2e855e9661899b7252")
.build())
.denyUnmatchedRequests(true)
.denyUnmatchedRequestsExemptedZoneNames("example.com")
.isUiReadOnly(true)
.loginDesign(ZeroTrustOrganizationLoginDesignArgs.builder()
.backgroundColor("#c5ed1b")
.footerText("This is an example description.")
.headerText("This is an example description.")
.logoPath("https://example.com/logo.png")
.textColor("#c5ed1b")
.build())
.mfaConfig(ZeroTrustOrganizationMfaConfigArgs.builder()
.allowedAuthenticators(
"totp",
"biometrics",
"security_key")
.amrMatchingSessionDuration("12h")
.requiredAaguids("2fc0579f-8113-47ea-b116-bb5a8db9202a")
.sessionDuration("24h")
.build())
.mfaRequiredForAllApps(false)
.mfaSshPivKeyRequirements(ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs.builder()
.pinPolicy("always")
.requireFipsDevice(true)
.sshKeySizes(
256,
2048)
.sshKeyTypes(
"ecdsa",
"rsa")
.touchPolicy("always")
.build())
.name("Widget Corps Internal Applications")
.sessionDuration("24h")
.uiReadOnlyToggleReason("Temporarily turn off the UI read only lock to make a change via the UI")
.userSeatExpirationInactiveTime("730h")
.warpAuthSessionDuration("24h")
.build());
}
}
resources:
exampleZeroTrustOrganization:
type: cloudflare:ZeroTrustOrganization
name: example_zero_trust_organization
properties:
zoneId: zone_id
allowAuthenticateViaWarp: true
authDomain: test.cloudflareaccess.com
autoRedirectToIdentity: true
customPages:
forbidden: 699d98642c564d2e855e9661899b7252
identityDenied: 699d98642c564d2e855e9661899b7252
denyUnmatchedRequests: true
denyUnmatchedRequestsExemptedZoneNames:
- example.com
isUiReadOnly: true
loginDesign:
backgroundColor: '#c5ed1b'
footerText: This is an example description.
headerText: This is an example description.
logoPath: https://example.com/logo.png
textColor: '#c5ed1b'
mfaConfig:
allowedAuthenticators:
- totp
- biometrics
- security_key
amrMatchingSessionDuration: 12h
requiredAaguids: 2fc0579f-8113-47ea-b116-bb5a8db9202a
sessionDuration: 24h
mfaRequiredForAllApps: false
mfaSshPivKeyRequirements:
pinPolicy: always
requireFipsDevice: true
sshKeySizes:
- 256
- 2048
sshKeyTypes:
- ecdsa
- rsa
touchPolicy: always
name: Widget Corps Internal Applications
sessionDuration: 24h
uiReadOnlyToggleReason: Temporarily turn off the UI read only lock to make a change via the UI
userSeatExpirationInactiveTime: 730h
warpAuthSessionDuration: 24h
Example coming soon!
Create ZeroTrustOrganization Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ZeroTrustOrganization(name: string, args?: ZeroTrustOrganizationArgs, opts?: CustomResourceOptions);@overload
def ZeroTrustOrganization(resource_name: str,
args: Optional[ZeroTrustOrganizationArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ZeroTrustOrganization(resource_name: str,
opts: Optional[ResourceOptions] = None,
account_id: Optional[str] = None,
allow_authenticate_via_warp: Optional[bool] = None,
auth_domain: Optional[str] = None,
auto_redirect_to_identity: Optional[bool] = None,
custom_pages: Optional[ZeroTrustOrganizationCustomPagesArgs] = None,
deny_unmatched_requests: Optional[bool] = None,
deny_unmatched_requests_exempted_zone_names: Optional[Sequence[str]] = None,
is_ui_read_only: Optional[bool] = None,
login_design: Optional[ZeroTrustOrganizationLoginDesignArgs] = None,
mfa_config: Optional[ZeroTrustOrganizationMfaConfigArgs] = None,
mfa_configuration_allowed: Optional[bool] = None,
mfa_required_for_all_apps: Optional[bool] = None,
mfa_ssh_piv_key_requirements: Optional[ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs] = None,
name: Optional[str] = None,
session_duration: Optional[str] = None,
ui_read_only_toggle_reason: Optional[str] = None,
user_seat_expiration_inactive_time: Optional[str] = None,
warp_auth_session_duration: Optional[str] = None,
zone_id: Optional[str] = None)func NewZeroTrustOrganization(ctx *Context, name string, args *ZeroTrustOrganizationArgs, opts ...ResourceOption) (*ZeroTrustOrganization, error)public ZeroTrustOrganization(string name, ZeroTrustOrganizationArgs? args = null, CustomResourceOptions? opts = null)
public ZeroTrustOrganization(String name, ZeroTrustOrganizationArgs args)
public ZeroTrustOrganization(String name, ZeroTrustOrganizationArgs args, CustomResourceOptions options)
type: cloudflare:ZeroTrustOrganization
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
resource "cloudflare_zerotrustorganization" "name" {
# resource properties
}Parameters
- name string
- The unique name of the resource.
- args ZeroTrustOrganizationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ZeroTrustOrganizationArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ZeroTrustOrganizationArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ZeroTrustOrganizationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ZeroTrustOrganizationArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var zeroTrustOrganizationResource = new Cloudflare.ZeroTrustOrganization("zeroTrustOrganizationResource", new()
{
AccountId = "string",
AllowAuthenticateViaWarp = false,
AuthDomain = "string",
AutoRedirectToIdentity = false,
CustomPages = new Cloudflare.Inputs.ZeroTrustOrganizationCustomPagesArgs
{
Forbidden = "string",
IdentityDenied = "string",
},
DenyUnmatchedRequests = false,
DenyUnmatchedRequestsExemptedZoneNames = new[]
{
"string",
},
IsUiReadOnly = false,
LoginDesign = new Cloudflare.Inputs.ZeroTrustOrganizationLoginDesignArgs
{
BackgroundColor = "string",
FooterText = "string",
HeaderText = "string",
LogoPath = "string",
TextColor = "string",
},
MfaConfig = new Cloudflare.Inputs.ZeroTrustOrganizationMfaConfigArgs
{
AllowedAuthenticators = new[]
{
"string",
},
AmrMatchingSessionDuration = "string",
RequiredAaguids = "string",
SessionDuration = "string",
},
MfaConfigurationAllowed = false,
MfaRequiredForAllApps = false,
MfaSshPivKeyRequirements = new Cloudflare.Inputs.ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs
{
PinPolicy = "string",
RequireFipsDevice = false,
SshKeySizes = new[]
{
0,
},
SshKeyTypes = new[]
{
"string",
},
TouchPolicy = "string",
},
Name = "string",
SessionDuration = "string",
UiReadOnlyToggleReason = "string",
UserSeatExpirationInactiveTime = "string",
WarpAuthSessionDuration = "string",
ZoneId = "string",
});
example, err := cloudflare.NewZeroTrustOrganization(ctx, "zeroTrustOrganizationResource", &cloudflare.ZeroTrustOrganizationArgs{
AccountId: pulumi.String("string"),
AllowAuthenticateViaWarp: pulumi.Bool(false),
AuthDomain: pulumi.String("string"),
AutoRedirectToIdentity: pulumi.Bool(false),
CustomPages: &cloudflare.ZeroTrustOrganizationCustomPagesArgs{
Forbidden: pulumi.String("string"),
IdentityDenied: pulumi.String("string"),
},
DenyUnmatchedRequests: pulumi.Bool(false),
DenyUnmatchedRequestsExemptedZoneNames: pulumi.StringArray{
pulumi.String("string"),
},
IsUiReadOnly: pulumi.Bool(false),
LoginDesign: &cloudflare.ZeroTrustOrganizationLoginDesignArgs{
BackgroundColor: pulumi.String("string"),
FooterText: pulumi.String("string"),
HeaderText: pulumi.String("string"),
LogoPath: pulumi.String("string"),
TextColor: pulumi.String("string"),
},
MfaConfig: &cloudflare.ZeroTrustOrganizationMfaConfigArgs{
AllowedAuthenticators: pulumi.StringArray{
pulumi.String("string"),
},
AmrMatchingSessionDuration: pulumi.String("string"),
RequiredAaguids: pulumi.String("string"),
SessionDuration: pulumi.String("string"),
},
MfaConfigurationAllowed: pulumi.Bool(false),
MfaRequiredForAllApps: pulumi.Bool(false),
MfaSshPivKeyRequirements: &cloudflare.ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs{
PinPolicy: pulumi.String("string"),
RequireFipsDevice: pulumi.Bool(false),
SshKeySizes: pulumi.IntArray{
pulumi.Int(0),
},
SshKeyTypes: pulumi.StringArray{
pulumi.String("string"),
},
TouchPolicy: pulumi.String("string"),
},
Name: pulumi.String("string"),
SessionDuration: pulumi.String("string"),
UiReadOnlyToggleReason: pulumi.String("string"),
UserSeatExpirationInactiveTime: pulumi.String("string"),
WarpAuthSessionDuration: pulumi.String("string"),
ZoneId: pulumi.String("string"),
})
resource "cloudflare_zerotrustorganization" "zeroTrustOrganizationResource" {
account_id = "string"
allow_authenticate_via_warp = false
auth_domain = "string"
auto_redirect_to_identity = false
custom_pages = {
forbidden = "string"
identity_denied = "string"
}
deny_unmatched_requests = false
deny_unmatched_requests_exempted_zone_names = ["string"]
is_ui_read_only = false
login_design = {
background_color = "string"
footer_text = "string"
header_text = "string"
logo_path = "string"
text_color = "string"
}
mfa_config = {
allowed_authenticators = ["string"]
amr_matching_session_duration = "string"
required_aaguids = "string"
session_duration = "string"
}
mfa_configuration_allowed = false
mfa_required_for_all_apps = false
mfa_ssh_piv_key_requirements = {
pin_policy = "string"
require_fips_device = false
ssh_key_sizes = [0]
ssh_key_types = ["string"]
touch_policy = "string"
}
name = "string"
session_duration = "string"
ui_read_only_toggle_reason = "string"
user_seat_expiration_inactive_time = "string"
warp_auth_session_duration = "string"
zone_id = "string"
}
var zeroTrustOrganizationResource = new ZeroTrustOrganization("zeroTrustOrganizationResource", ZeroTrustOrganizationArgs.builder()
.accountId("string")
.allowAuthenticateViaWarp(false)
.authDomain("string")
.autoRedirectToIdentity(false)
.customPages(ZeroTrustOrganizationCustomPagesArgs.builder()
.forbidden("string")
.identityDenied("string")
.build())
.denyUnmatchedRequests(false)
.denyUnmatchedRequestsExemptedZoneNames("string")
.isUiReadOnly(false)
.loginDesign(ZeroTrustOrganizationLoginDesignArgs.builder()
.backgroundColor("string")
.footerText("string")
.headerText("string")
.logoPath("string")
.textColor("string")
.build())
.mfaConfig(ZeroTrustOrganizationMfaConfigArgs.builder()
.allowedAuthenticators("string")
.amrMatchingSessionDuration("string")
.requiredAaguids("string")
.sessionDuration("string")
.build())
.mfaConfigurationAllowed(false)
.mfaRequiredForAllApps(false)
.mfaSshPivKeyRequirements(ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs.builder()
.pinPolicy("string")
.requireFipsDevice(false)
.sshKeySizes(0)
.sshKeyTypes("string")
.touchPolicy("string")
.build())
.name("string")
.sessionDuration("string")
.uiReadOnlyToggleReason("string")
.userSeatExpirationInactiveTime("string")
.warpAuthSessionDuration("string")
.zoneId("string")
.build());
zero_trust_organization_resource = cloudflare.ZeroTrustOrganization("zeroTrustOrganizationResource",
account_id="string",
allow_authenticate_via_warp=False,
auth_domain="string",
auto_redirect_to_identity=False,
custom_pages={
"forbidden": "string",
"identity_denied": "string",
},
deny_unmatched_requests=False,
deny_unmatched_requests_exempted_zone_names=["string"],
is_ui_read_only=False,
login_design={
"background_color": "string",
"footer_text": "string",
"header_text": "string",
"logo_path": "string",
"text_color": "string",
},
mfa_config={
"allowed_authenticators": ["string"],
"amr_matching_session_duration": "string",
"required_aaguids": "string",
"session_duration": "string",
},
mfa_configuration_allowed=False,
mfa_required_for_all_apps=False,
mfa_ssh_piv_key_requirements={
"pin_policy": "string",
"require_fips_device": False,
"ssh_key_sizes": [0],
"ssh_key_types": ["string"],
"touch_policy": "string",
},
name="string",
session_duration="string",
ui_read_only_toggle_reason="string",
user_seat_expiration_inactive_time="string",
warp_auth_session_duration="string",
zone_id="string")
const zeroTrustOrganizationResource = new cloudflare.ZeroTrustOrganization("zeroTrustOrganizationResource", {
accountId: "string",
allowAuthenticateViaWarp: false,
authDomain: "string",
autoRedirectToIdentity: false,
customPages: {
forbidden: "string",
identityDenied: "string",
},
denyUnmatchedRequests: false,
denyUnmatchedRequestsExemptedZoneNames: ["string"],
isUiReadOnly: false,
loginDesign: {
backgroundColor: "string",
footerText: "string",
headerText: "string",
logoPath: "string",
textColor: "string",
},
mfaConfig: {
allowedAuthenticators: ["string"],
amrMatchingSessionDuration: "string",
requiredAaguids: "string",
sessionDuration: "string",
},
mfaConfigurationAllowed: false,
mfaRequiredForAllApps: false,
mfaSshPivKeyRequirements: {
pinPolicy: "string",
requireFipsDevice: false,
sshKeySizes: [0],
sshKeyTypes: ["string"],
touchPolicy: "string",
},
name: "string",
sessionDuration: "string",
uiReadOnlyToggleReason: "string",
userSeatExpirationInactiveTime: "string",
warpAuthSessionDuration: "string",
zoneId: "string",
});
type: cloudflare:ZeroTrustOrganization
properties:
accountId: string
allowAuthenticateViaWarp: false
authDomain: string
autoRedirectToIdentity: false
customPages:
forbidden: string
identityDenied: string
denyUnmatchedRequests: false
denyUnmatchedRequestsExemptedZoneNames:
- string
isUiReadOnly: false
loginDesign:
backgroundColor: string
footerText: string
headerText: string
logoPath: string
textColor: string
mfaConfig:
allowedAuthenticators:
- string
amrMatchingSessionDuration: string
requiredAaguids: string
sessionDuration: string
mfaConfigurationAllowed: false
mfaRequiredForAllApps: false
mfaSshPivKeyRequirements:
pinPolicy: string
requireFipsDevice: false
sshKeySizes:
- 0
sshKeyTypes:
- string
touchPolicy: string
name: string
sessionDuration: string
uiReadOnlyToggleReason: string
userSeatExpirationInactiveTime: string
warpAuthSessionDuration: string
zoneId: string
ZeroTrustOrganization Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ZeroTrustOrganization resource accepts the following input properties:
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Allow
Authenticate boolVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- Auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- Auto
Redirect boolTo Identity - When set to
true, users skip the identity provider selection step during login. - Custom
Pages ZeroTrust Organization Custom Pages - Deny
Unmatched boolRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - Deny
Unmatched List<string>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - Is
Ui boolRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- Login
Design ZeroTrust Organization Login Design - Mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- Mfa
Configuration boolAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- Mfa
Required boolFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- Mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- Name string
- The name of your Zero Trust organization.
- Session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - Ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- User
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - Warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Allow
Authenticate boolVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- Auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- Auto
Redirect boolTo Identity - When set to
true, users skip the identity provider selection step during login. - Custom
Pages ZeroTrust Organization Custom Pages Args - Deny
Unmatched boolRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - Deny
Unmatched []stringRequests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - Is
Ui boolRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- Login
Design ZeroTrust Organization Login Design Args - Mfa
Config ZeroTrust Organization Mfa Config Args - Configures multi-factor authentication (MFA) settings for an organization.
- Mfa
Configuration boolAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- Mfa
Required boolFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- Mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements Args - Configures SSH PIV key requirements for MFA using hardware security keys.
- Name string
- The name of your Zero Trust organization.
- Session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - Ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- User
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - Warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow_
authenticate_ boolvia_ warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth_
domain string - The unique subdomain assigned to your Zero Trust organization.
- auto_
redirect_ boolto_ identity - When set to
true, users skip the identity provider selection step during login. - custom_
pages object - deny_
unmatched_ boolrequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny_
unmatched_ list(string)requests_ exempted_ zone_ names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is_
ui_ boolread_ only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login_
design object - mfa_
config object - Configures multi-factor authentication (MFA) settings for an organization.
- mfa_
configuration_ boolallowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa_
required_ boolfor_ all_ apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa_
ssh_ objectpiv_ key_ requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name string
- The name of your Zero Trust organization.
- session_
duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui_
read_ stringonly_ toggle_ reason - A description of the reason why the UI read only field is being toggled.
- user_
seat_ stringexpiration_ inactive_ time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp_
auth_ stringsession_ duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone_
id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate BooleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain String - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect BooleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages ZeroTrust Organization Custom Pages - deny
Unmatched BooleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched List<String>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui BooleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design ZeroTrust Organization Login Design - mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration BooleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required BooleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name String
- The name of your Zero Trust organization.
- session
Duration String - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read StringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat StringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth StringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate booleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect booleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages ZeroTrust Organization Custom Pages - deny
Unmatched booleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched string[]Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui booleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design ZeroTrust Organization Login Design - mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration booleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required booleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name string
- The name of your Zero Trust organization.
- session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow_
authenticate_ boolvia_ warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth_
domain str - The unique subdomain assigned to your Zero Trust organization.
- auto_
redirect_ boolto_ identity - When set to
true, users skip the identity provider selection step during login. - custom_
pages ZeroTrust Organization Custom Pages Args - deny_
unmatched_ boolrequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny_
unmatched_ Sequence[str]requests_ exempted_ zone_ names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is_
ui_ boolread_ only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login_
design ZeroTrust Organization Login Design Args - mfa_
config ZeroTrust Organization Mfa Config Args - Configures multi-factor authentication (MFA) settings for an organization.
- mfa_
configuration_ boolallowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa_
required_ boolfor_ all_ apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa_
ssh_ Zeropiv_ key_ requirements Trust Organization Mfa Ssh Piv Key Requirements Args - Configures SSH PIV key requirements for MFA using hardware security keys.
- name str
- The name of your Zero Trust organization.
- session_
duration str - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui_
read_ stronly_ toggle_ reason - A description of the reason why the UI read only field is being toggled.
- user_
seat_ strexpiration_ inactive_ time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp_
auth_ strsession_ duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate BooleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain String - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect BooleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages Property Map - deny
Unmatched BooleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched List<String>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui BooleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design Property Map - mfa
Config Property Map - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration BooleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required BooleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh Property MapPiv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name String
- The name of your Zero Trust organization.
- session
Duration String - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read StringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat StringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth StringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
Outputs
All input properties are implicitly available as output properties. Additionally, the ZeroTrustOrganization resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ZeroTrustOrganization Resource
Get an existing ZeroTrustOrganization resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ZeroTrustOrganizationState, opts?: CustomResourceOptions): ZeroTrustOrganization@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
account_id: Optional[str] = None,
allow_authenticate_via_warp: Optional[bool] = None,
auth_domain: Optional[str] = None,
auto_redirect_to_identity: Optional[bool] = None,
custom_pages: Optional[ZeroTrustOrganizationCustomPagesArgs] = None,
deny_unmatched_requests: Optional[bool] = None,
deny_unmatched_requests_exempted_zone_names: Optional[Sequence[str]] = None,
is_ui_read_only: Optional[bool] = None,
login_design: Optional[ZeroTrustOrganizationLoginDesignArgs] = None,
mfa_config: Optional[ZeroTrustOrganizationMfaConfigArgs] = None,
mfa_configuration_allowed: Optional[bool] = None,
mfa_required_for_all_apps: Optional[bool] = None,
mfa_ssh_piv_key_requirements: Optional[ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs] = None,
name: Optional[str] = None,
session_duration: Optional[str] = None,
ui_read_only_toggle_reason: Optional[str] = None,
user_seat_expiration_inactive_time: Optional[str] = None,
warp_auth_session_duration: Optional[str] = None,
zone_id: Optional[str] = None) -> ZeroTrustOrganizationfunc GetZeroTrustOrganization(ctx *Context, name string, id IDInput, state *ZeroTrustOrganizationState, opts ...ResourceOption) (*ZeroTrustOrganization, error)public static ZeroTrustOrganization Get(string name, Input<string> id, ZeroTrustOrganizationState? state, CustomResourceOptions? opts = null)public static ZeroTrustOrganization get(String name, Output<String> id, ZeroTrustOrganizationState state, CustomResourceOptions options)resources: _: type: cloudflare:ZeroTrustOrganization get: id: ${id}import {
to = cloudflare_zerotrustorganization.example
id = "${id}"
}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Allow
Authenticate boolVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- Auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- Auto
Redirect boolTo Identity - When set to
true, users skip the identity provider selection step during login. - Custom
Pages ZeroTrust Organization Custom Pages - Deny
Unmatched boolRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - Deny
Unmatched List<string>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - Is
Ui boolRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- Login
Design ZeroTrust Organization Login Design - Mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- Mfa
Configuration boolAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- Mfa
Required boolFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- Mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- Name string
- The name of your Zero Trust organization.
- Session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - Ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- User
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - Warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Allow
Authenticate boolVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- Auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- Auto
Redirect boolTo Identity - When set to
true, users skip the identity provider selection step during login. - Custom
Pages ZeroTrust Organization Custom Pages Args - Deny
Unmatched boolRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - Deny
Unmatched []stringRequests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - Is
Ui boolRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- Login
Design ZeroTrust Organization Login Design Args - Mfa
Config ZeroTrust Organization Mfa Config Args - Configures multi-factor authentication (MFA) settings for an organization.
- Mfa
Configuration boolAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- Mfa
Required boolFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- Mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements Args - Configures SSH PIV key requirements for MFA using hardware security keys.
- Name string
- The name of your Zero Trust organization.
- Session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - Ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- User
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - Warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow_
authenticate_ boolvia_ warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth_
domain string - The unique subdomain assigned to your Zero Trust organization.
- auto_
redirect_ boolto_ identity - When set to
true, users skip the identity provider selection step during login. - custom_
pages object - deny_
unmatched_ boolrequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny_
unmatched_ list(string)requests_ exempted_ zone_ names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is_
ui_ boolread_ only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login_
design object - mfa_
config object - Configures multi-factor authentication (MFA) settings for an organization.
- mfa_
configuration_ boolallowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa_
required_ boolfor_ all_ apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa_
ssh_ objectpiv_ key_ requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name string
- The name of your Zero Trust organization.
- session_
duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui_
read_ stringonly_ toggle_ reason - A description of the reason why the UI read only field is being toggled.
- user_
seat_ stringexpiration_ inactive_ time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp_
auth_ stringsession_ duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone_
id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate BooleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain String - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect BooleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages ZeroTrust Organization Custom Pages - deny
Unmatched BooleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched List<String>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui BooleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design ZeroTrust Organization Login Design - mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration BooleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required BooleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name String
- The name of your Zero Trust organization.
- session
Duration String - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read StringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat StringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth StringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate booleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain string - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect booleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages ZeroTrust Organization Custom Pages - deny
Unmatched booleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched string[]Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui booleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design ZeroTrust Organization Login Design - mfa
Config ZeroTrust Organization Mfa Config - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration booleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required booleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh ZeroPiv Key Requirements Trust Organization Mfa Ssh Piv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name string
- The name of your Zero Trust organization.
- session
Duration string - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read stringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat stringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth stringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow_
authenticate_ boolvia_ warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth_
domain str - The unique subdomain assigned to your Zero Trust organization.
- auto_
redirect_ boolto_ identity - When set to
true, users skip the identity provider selection step during login. - custom_
pages ZeroTrust Organization Custom Pages Args - deny_
unmatched_ boolrequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny_
unmatched_ Sequence[str]requests_ exempted_ zone_ names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is_
ui_ boolread_ only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login_
design ZeroTrust Organization Login Design Args - mfa_
config ZeroTrust Organization Mfa Config Args - Configures multi-factor authentication (MFA) settings for an organization.
- mfa_
configuration_ boolallowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa_
required_ boolfor_ all_ apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa_
ssh_ Zeropiv_ key_ requirements Trust Organization Mfa Ssh Piv Key Requirements Args - Configures SSH PIV key requirements for MFA using hardware security keys.
- name str
- The name of your Zero Trust organization.
- session_
duration str - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui_
read_ stronly_ toggle_ reason - A description of the reason why the UI read only field is being toggled.
- user_
seat_ strexpiration_ inactive_ time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp_
auth_ strsession_ duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- allow
Authenticate BooleanVia Warp - When set to true, users can authenticate via WARP for any application in your organization. Application settings will take precedence over this value.
- auth
Domain String - The unique subdomain assigned to your Zero Trust organization.
- auto
Redirect BooleanTo Identity - When set to
true, users skip the identity provider selection step during login. - custom
Pages Property Map - deny
Unmatched BooleanRequests - Determines whether to deny all requests to Cloudflare-protected resources that lack an associated Access application. If enabled, you must explicitly configure an Access application and policy to allow traffic to your Cloudflare-protected resources. For domains you want to be public across all subdomains, add the domain to the
denyUnmatchedRequestsExemptedZoneNamesarray. - deny
Unmatched List<String>Requests Exempted Zone Names - Contains zone names to exempt from the
denyUnmatchedRequestsfeature. Requests to a subdomain in an exempted zone will block unauthenticated traffic by default if there is a configured Access application and policy that matches the request. - is
Ui BooleanRead Only - Lock all settings as Read-Only in the Dashboard, regardless of user permission. Updates may only be made via the API or Terraform for this account when enabled.
- login
Design Property Map - mfa
Config Property Map - Configures multi-factor authentication (MFA) settings for an organization.
- mfa
Configuration BooleanAllowed - Indicates if this organization can enforce multi-factor authentication (MFA) requirements at the application and policy level.
- mfa
Required BooleanFor All Apps - Determines whether global MFA settings apply to applications by default. The organization must have MFA enabled with at least one authentication method and a session duration configured.
- mfa
Ssh Property MapPiv Key Requirements - Configures SSH PIV key requirements for MFA using hardware security keys.
- name String
- The name of your Zero Trust organization.
- session
Duration String - The amount of time that tokens issued for applications will be valid. Must be in the format
300msor2h45m. Valid time units are: ns, us (or µs), ms, s, m, h. - ui
Read StringOnly Toggle Reason - A description of the reason why the UI read only field is being toggled.
- user
Seat StringExpiration Inactive Time - The amount of time a user seat is inactive before it expires. When the user seat exceeds the set time of inactivity, the user is removed as an active seat and no longer counts against your Teams seat count. Minimum value for this setting is 1 month (730h). Must be in the format
300msor2h45m. Valid time units are:ns,us(orµs),ms,s,m,h. - warp
Auth StringSession Duration - The amount of time that tokens issued for applications will be valid. Must be in the format
30mor2h45m. Valid time units are: m, h. - zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
Supporting Types
ZeroTrustOrganizationCustomPages, ZeroTrustOrganizationCustomPagesArgs
- Forbidden string
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- Identity
Denied string - The uid of the custom page to use when a user is denied access.
- Forbidden string
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- Identity
Denied string - The uid of the custom page to use when a user is denied access.
- forbidden string
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- identity_
denied string - The uid of the custom page to use when a user is denied access.
- forbidden String
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- identity
Denied String - The uid of the custom page to use when a user is denied access.
- forbidden string
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- identity
Denied string - The uid of the custom page to use when a user is denied access.
- forbidden str
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- identity_
denied str - The uid of the custom page to use when a user is denied access.
- forbidden String
- The uid of the custom page to use when a user is denied access after failing a non-identity rule.
- identity
Denied String - The uid of the custom page to use when a user is denied access.
ZeroTrustOrganizationLoginDesign, ZeroTrustOrganizationLoginDesignArgs
- Background
Color string - The background color on your login page.
- string
- The text at the bottom of your login page.
- Header
Text string - The text at the top of your login page.
- Logo
Path string - The URL of the logo on your login page.
- Text
Color string - The text color on your login page.
- Background
Color string - The background color on your login page.
- string
- The text at the bottom of your login page.
- Header
Text string - The text at the top of your login page.
- Logo
Path string - The URL of the logo on your login page.
- Text
Color string - The text color on your login page.
- background_
color string - The background color on your login page.
- string
- The text at the bottom of your login page.
- header_
text string - The text at the top of your login page.
- logo_
path string - The URL of the logo on your login page.
- text_
color string - The text color on your login page.
- background
Color String - The background color on your login page.
- String
- The text at the bottom of your login page.
- header
Text String - The text at the top of your login page.
- logo
Path String - The URL of the logo on your login page.
- text
Color String - The text color on your login page.
- background
Color string - The background color on your login page.
- string
- The text at the bottom of your login page.
- header
Text string - The text at the top of your login page.
- logo
Path string - The URL of the logo on your login page.
- text
Color string - The text color on your login page.
- background_
color str - The background color on your login page.
- str
- The text at the bottom of your login page.
- header_
text str - The text at the top of your login page.
- logo_
path str - The URL of the logo on your login page.
- text_
color str - The text color on your login page.
- background
Color String - The background color on your login page.
- String
- The text at the bottom of your login page.
- header
Text String - The text at the top of your login page.
- logo
Path String - The URL of the logo on your login page.
- text
Color String - The text color on your login page.
ZeroTrustOrganizationMfaConfig, ZeroTrustOrganizationMfaConfigArgs
- Allowed
Authenticators List<string> - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - Amr
Matching stringSession Duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- Required
Aaguids string - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- Session
Duration string - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- Allowed
Authenticators []string - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - Amr
Matching stringSession Duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- Required
Aaguids string - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- Session
Duration string - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- allowed_
authenticators list(string) - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - amr_
matching_ stringsession_ duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- required_
aaguids string - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- session_
duration string - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- allowed
Authenticators List<String> - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - amr
Matching StringSession Duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- required
Aaguids String - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- session
Duration String - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- allowed
Authenticators string[] - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - amr
Matching stringSession Duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- required
Aaguids string - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- session
Duration string - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- allowed_
authenticators Sequence[str] - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - amr_
matching_ strsession_ duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- required_
aaguids str - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- session_
duration str - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
- allowed
Authenticators List<String> - Lists the MFA methods that users can authenticate with.
sshPivKeyis only relevant for infrastructure applications. - amr
Matching StringSession Duration - Allows a user to skip MFA via Authentication Method Reference (AMR) matching when the AMR claim provided by the IdP the user used to authenticate contains "mfa". Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
- required
Aaguids String - Specifies a Cloudflare List of required FIDO2 authenticator device AAGUIDs.
- session
Duration String - Defines the duration of an MFA session. Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days). Examples:
5mor24h.
ZeroTrustOrganizationMfaSshPivKeyRequirements, ZeroTrustOrganizationMfaSshPivKeyRequirementsArgs
- Pin
Policy string - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - Require
Fips boolDevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- Ssh
Key List<int>Sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- Ssh
Key List<string>Types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - Touch
Policy string - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- Pin
Policy string - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - Require
Fips boolDevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- Ssh
Key []intSizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- Ssh
Key []stringTypes - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - Touch
Policy string - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- pin_
policy string - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - require_
fips_ booldevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- ssh_
key_ list(number)sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- ssh_
key_ list(string)types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - touch_
policy string - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- pin
Policy String - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - require
Fips BooleanDevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- ssh
Key List<Integer>Sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- ssh
Key List<String>Types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - touch
Policy String - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- pin
Policy string - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - require
Fips booleanDevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- ssh
Key number[]Sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- ssh
Key string[]Types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - touch
Policy string - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- pin_
policy str - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - require_
fips_ booldevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- ssh_
key_ Sequence[int]sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- ssh_
key_ Sequence[str]types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - touch_
policy str - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
- pin
Policy String - Defines when a PIN is required to use the SSH key. Valid values:
never(no PIN required),once(PIN required once per session),always(PIN required for each use). Available values: "never", "once", "always". - require
Fips BooleanDevice - Requires the SSH PIV key to be stored on a FIPS 140-2 Level 1 or higher validated device.
- ssh
Key List<Number>Sizes - Specifies the allowed SSH key sizes in bits. Valid sizes depend on key type. Ed25519 has a fixed key size and does not accept this parameter.
- ssh
Key List<String>Types - Specifies the allowed SSH key types. Valid values are
ecdsa,ed25519, andrsa. - touch
Policy String - Defines when physical touch is required to use the SSH key. Valid values:
never(no touch required),always(touch required for each use),cached(touch cached for 15 seconds). Available values: "never", "always", "cached".
Import
This resource does not currently support
pulumi import.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Cloudflare pulumi/pulumi-cloudflare
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
cloudflareTerraform Provider.
published on Saturday, May 2, 2026 by Pulumi
