Skip to content

Cloudflare Access independent MFA#29681

Closed
asamborski wants to merge 3 commits intocloudflare:productionfrom
asamborski:asamborski_independent_mfa
Closed

Cloudflare Access independent MFA#29681
asamborski wants to merge 3 commits intocloudflare:productionfrom
asamborski:asamborski_independent_mfa

Conversation

@asamborski
Copy link
Copy Markdown
Contributor

Summary

Cloudflare Access supports independent multi-factor authentication (MFA), allowing you to enforce MFA requirements without relying on your identity provider (IdP). This feature addresses common gaps in IdP-based MFA, such as inconsistent MFA policies across different identity providers or the need for additional security layers beyond what the IdP provides.

Screenshots (optional)

image

Documentation checklist

  • Is there a changelog entry (guidelines)? If you don't add one for something awesome and new (however small) — how will our customers find out? Changelogs are automatically posted to RSS feeds, the Discord, and X.
  • The change adheres to the documentation style guide.
  • If a larger change - such as adding a new page- an issue has been opened in relation to any incorrect or out of date information that this PR fixes.


</TabItem> <TabItem label="API">

Send a `PUT` request to update your Access organization settings with MFA configuration:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should be PATCH? We support PUT but that means sending all existing values too

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see a PATCH option in the API docs, only PUT: https://developers.cloudflare.com/api/resources/zero_trust/subresources/organizations/methods/update

Do we support PATCH?

4. **[Global session](#global-session-duration)** — Controls how often the user must log in to the IdP across all applications.

:::note
If you use [independent MFA](/cloudflare-one/access-controls/access-settings/independent-mfa/), the MFA session duration is managed separately from the sessions listed above. A user can have a valid application session but still be prompted for MFA if their MFA session has expired. For more information, refer to [MFA session duration](/cloudflare-one/access-controls/policies/mfa-requirements/#mfa-session-duration).
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this is accurate

Application session (or policy session duration) always last however long they're defined - if MFA expires while an app session is active, the user can still access the app. They're not prompted for MFA until they go to a different app

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think it applies mid session, but if you try to access the application again from another tab, wouldn't MFA fire?

@ranbel
Copy link
Copy Markdown
Contributor

ranbel commented Apr 10, 2026

superseded by #29713

@ranbel ranbel closed this Apr 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants