mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 06:55:52 +03:00
[GH-ISSUE #1302] Custom HTTP Header for Cloudflare Access #809
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#809
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @luminous706 on GitHub (Oct 3, 2022).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/1302
Hello, for multi-tenancy, Tactical RMM requires a server in the cloud with port 443 opened to the internet, especially if deployed at scale.
By putting the domains behind Cloudflare Access (Zero Trust) (api, rmm, etc), only the tactical agents with the special HTTP header token would be able to pass through the Cloudflare proxy, adding a lot of protections to Tactical.
Could you look into implementing such feature? I think just a way to add a custom web header every time Tactical reaches out to the server could work.