Dec 14, 08:58 UTC
Resolved - This incident has been resolved.
Dec 14, 08:52 UTC
Monitoring - A fix has been implemented and we are monitoring the results.
Dec 13, 22:24 UTC
Identified - The issue has been identified and a fix is being implemented.
Dec 13, 21:20 UTC
Investigating - When an Okta, Azure, GitHub or Google Group selector is used, all SSH policies will match to users having unauthorized access to infrastructure targets. Users must still pass all other components of the policy. Infrastructure Access applications without the affected Group Selectors and all other Access application types are not impacted.
This is a companion discussion topic for the original entry at https://www.cloudflarestatus.com/incidents/4g5mdg35j1c6