Filter specific user who can access the application
What steps have you taken to resolve the issue?
Using Zero Trust, I’ve created a tunnel to access my local application remotely. A policy to filter the source IP was bound to the application, and this worked perfectly.
However, in the authentication page, any email address you type in can receive an OTP. Is this default behavior? I want my specific email to receive the code. I tried to create a policy for email, but I can’t make it work.
Default behavior is block. Cloudflare Access is a deny by default service, which means if a request does not match any policy action, the default action is “Block.”
Create a policy with Allow action and add Emails include youremails.
Meaning, if you’ve got only one single Allow policy and added your email address(es), only when you enter them, they are the ones which would and should receive the OTP pin code.
Does that mean you now have multiple policies? If so, the first would allow everyone to connect from the IP you configured, while the 2nd would allow someone with access to your email to connect from everywhere.