Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit d231762

Browse files
committedMar 13, 2025·
feat(api): api update (#2533)
1 parent 0a45fe8 commit d231762

File tree

14 files changed

+3429
-67
lines changed

14 files changed

+3429
-67
lines changed
 

‎.stats.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
configured_endpoints: 1610
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-0f0082a0942d9f9edb37ef99423f7cdf16d0bfeb57c6ee5728e830b2a9ebff87.yml
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-30da43ea5d0d999bce706d59618514c0c59d657ea27ad2e228663d731023449f.yml

‎src/cloudflare/resources/email_security/investigate/investigate.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ def list(
141141
detections_only: bool | NotGiven = NOT_GIVEN,
142142
domain: str | NotGiven = NOT_GIVEN,
143143
end: Union[str, datetime] | NotGiven = NOT_GIVEN,
144-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"] | NotGiven = NOT_GIVEN,
144+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"] | NotGiven = NOT_GIVEN,
145145
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"] | NotGiven = NOT_GIVEN,
146146
message_id: str | NotGiven = NOT_GIVEN,
147147
metric: str | NotGiven = NOT_GIVEN,
@@ -351,7 +351,7 @@ def list(
351351
detections_only: bool | NotGiven = NOT_GIVEN,
352352
domain: str | NotGiven = NOT_GIVEN,
353353
end: Union[str, datetime] | NotGiven = NOT_GIVEN,
354-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"] | NotGiven = NOT_GIVEN,
354+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"] | NotGiven = NOT_GIVEN,
355355
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"] | NotGiven = NOT_GIVEN,
356356
message_id: str | NotGiven = NOT_GIVEN,
357357
metric: str | NotGiven = NOT_GIVEN,

‎src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/secrets.py

+8-6
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ def update(
6868
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
6969
) -> Optional[SecretUpdateResponse]:
7070
"""
71-
Put secrets to a script uploaded to a Workers for Platforms namespace.
71+
Add a secret to a script uploaded to a Workers for Platforms namespace.
7272
7373
Args:
7474
account_id: Identifier
@@ -132,7 +132,7 @@ def list(
132132
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
133133
) -> SyncSinglePage[SecretListResponse]:
134134
"""
135-
List secrets from a script uploaded to a Workers for Platforms namespace.
135+
List secrets bound to a script uploaded to a Workers for Platforms namespace.
136136
137137
Args:
138138
account_id: Identifier
@@ -179,7 +179,8 @@ def get(
179179
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
180180
) -> Optional[SecretGetResponse]:
181181
"""
182-
Get secret from a script uploaded to a Workers for Platforms namespace.
182+
Get a given secret binding (value omitted) on a script uploaded to a Workers for
183+
Platforms namespace.
183184
184185
Args:
185186
account_id: Identifier
@@ -256,7 +257,7 @@ async def update(
256257
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
257258
) -> Optional[SecretUpdateResponse]:
258259
"""
259-
Put secrets to a script uploaded to a Workers for Platforms namespace.
260+
Add a secret to a script uploaded to a Workers for Platforms namespace.
260261
261262
Args:
262263
account_id: Identifier
@@ -320,7 +321,7 @@ def list(
320321
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
321322
) -> AsyncPaginator[SecretListResponse, AsyncSinglePage[SecretListResponse]]:
322323
"""
323-
List secrets from a script uploaded to a Workers for Platforms namespace.
324+
List secrets bound to a script uploaded to a Workers for Platforms namespace.
324325
325326
Args:
326327
account_id: Identifier
@@ -367,7 +368,8 @@ async def get(
367368
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
368369
) -> Optional[SecretGetResponse]:
369370
"""
370-
Get secret from a script uploaded to a Workers for Platforms namespace.
371+
Get a given secret binding (value omitted) on a script uploaded to a Workers for
372+
Platforms namespace.
371373
372374
Args:
373375
account_id: Identifier

‎src/cloudflare/resources/zero_trust/access/applications/applications.py

+558-24
Large diffs are not rendered by default.

‎src/cloudflare/types/email_security/investigate_list_params.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ class InvestigateListParams(TypedDict, total=False):
2929
end: Annotated[Union[str, datetime], PropertyInfo(format="iso8601")]
3030
"""The end of the search date range. Defaults to `now`."""
3131

32-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"]
32+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"]
3333
"""The dispositions the search filters by."""
3434

3535
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"]

‎src/cloudflare/types/email_security/submission_list_response.py

+2
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ class SubmissionListResponse(BaseModel):
2929
]
3030
] = None
3131

32+
original_edf_hash: Optional[str] = None
33+
3234
outcome: Optional[str] = None
3335

3436
outcome_disposition: Optional[

‎src/cloudflare/types/zero_trust/access/application_create_params.py

+363
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,19 @@
111111
"InfrastructureApplicationPolicy",
112112
"InfrastructureApplicationPolicyConnectionRules",
113113
"InfrastructureApplicationPolicyConnectionRulesSSH",
114+
"BrowserRdpApplication",
115+
"BrowserRdpApplicationTargetCriterion",
116+
"BrowserRdpApplicationDestination",
117+
"BrowserRdpApplicationDestinationPublicDestination",
118+
"BrowserRdpApplicationDestinationPrivateDestination",
119+
"BrowserRdpApplicationPolicy",
120+
"BrowserRdpApplicationPolicyAccessAppPolicyLink",
121+
"BrowserRdpApplicationPolicyUnionMember2",
122+
"BrowserRdpApplicationSCIMConfig",
123+
"BrowserRdpApplicationSCIMConfigAuthentication",
124+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
125+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
126+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114127
]
115128

116129

@@ -2217,6 +2230,355 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22172230
"""
22182231

22192232

2233+
class BrowserRdpApplication(TypedDict, total=False):
2234+
domain: Required[str]
2235+
"""The primary hostname and path secured by Access.
2236+
2237+
This domain will be displayed if the app is visible in the App Launcher.
2238+
"""
2239+
2240+
target_criteria: Required[Iterable[BrowserRdpApplicationTargetCriterion]]
2241+
2242+
type: Required[str]
2243+
"""The application type."""
2244+
2245+
account_id: str
2246+
"""The Account ID to use for this endpoint. Mutually exclusive with the Zone ID."""
2247+
2248+
zone_id: str
2249+
"""The Zone ID to use for this endpoint. Mutually exclusive with the Account ID."""
2250+
2251+
allow_authenticate_via_warp: bool
2252+
"""
2253+
When set to true, users can authenticate to this application using their WARP
2254+
session. When set to false this application will always require direct IdP
2255+
authentication. This setting always overrides the organization setting for WARP
2256+
authentication.
2257+
"""
2258+
2259+
allowed_idps: List[AllowedIdPs]
2260+
"""The identity providers your users can select when connecting to this
2261+
application.
2262+
2263+
Defaults to all IdPs configured in your account.
2264+
"""
2265+
2266+
app_launcher_visible: bool
2267+
"""Displays the application in the App Launcher."""
2268+
2269+
auto_redirect_to_identity: bool
2270+
"""When set to `true`, users skip the identity provider selection step during
2271+
login.
2272+
2273+
You must specify only one identity provider in allowed_idps.
2274+
"""
2275+
2276+
cors_headers: CORSHeadersParam
2277+
2278+
custom_deny_message: str
2279+
"""
2280+
The custom error message shown to a user when they are denied access to the
2281+
application.
2282+
"""
2283+
2284+
custom_deny_url: str
2285+
"""
2286+
The custom URL a user is redirected to when they are denied access to the
2287+
application when failing identity-based rules.
2288+
"""
2289+
2290+
custom_non_identity_deny_url: str
2291+
"""
2292+
The custom URL a user is redirected to when they are denied access to the
2293+
application when failing non-identity rules.
2294+
"""
2295+
2296+
custom_pages: List[str]
2297+
"""The custom pages that will be displayed when applicable for this application"""
2298+
2299+
destinations: Iterable[BrowserRdpApplicationDestination]
2300+
"""List of destinations secured by Access.
2301+
2302+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2303+
different types of domains. If `destinations` are provided, then
2304+
`self_hosted_domains` will be ignored.
2305+
"""
2306+
2307+
enable_binding_cookie: bool
2308+
"""
2309+
Enables the binding cookie, which increases security against compromised
2310+
authorization tokens and CSRF attacks.
2311+
"""
2312+
2313+
http_only_cookie_attribute: bool
2314+
"""
2315+
Enables the HttpOnly cookie attribute, which increases security against XSS
2316+
attacks.
2317+
"""
2318+
2319+
logo_url: str
2320+
"""The image URL for the logo shown in the App Launcher dashboard."""
2321+
2322+
name: str
2323+
"""The name of the application."""
2324+
2325+
options_preflight_bypass: bool
2326+
"""
2327+
Allows options preflight requests to bypass Access authentication and go
2328+
directly to the origin. Cannot turn on if cors_headers is set.
2329+
"""
2330+
2331+
path_cookie_attribute: bool
2332+
"""Enables cookie paths to scope an application's JWT to the application path.
2333+
2334+
If disabled, the JWT will scope to the hostname by default
2335+
"""
2336+
2337+
policies: List[BrowserRdpApplicationPolicy]
2338+
"""
2339+
The policies that Access applies to the application, in ascending order of
2340+
precedence. Items can reference existing policies or create new policies
2341+
exclusive to the application.
2342+
"""
2343+
2344+
same_site_cookie_attribute: str
2345+
"""
2346+
Sets the SameSite cookie setting, which provides increased security against CSRF
2347+
attacks.
2348+
"""
2349+
2350+
scim_config: BrowserRdpApplicationSCIMConfig
2351+
"""Configuration for provisioning to this application via SCIM.
2352+
2353+
This is currently in closed beta.
2354+
"""
2355+
2356+
self_hosted_domains: List[SelfHostedDomains]
2357+
"""List of public domains that Access will secure.
2358+
2359+
This field is deprecated in favor of `destinations` and will be supported until
2360+
**November 21, 2025.** If `destinations` are provided, then
2361+
`self_hosted_domains` will be ignored.
2362+
"""
2363+
2364+
service_auth_401_redirect: bool
2365+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2366+
2367+
session_duration: str
2368+
"""The amount of time that tokens issued for this application will be valid.
2369+
2370+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2371+
ms, s, m, h.
2372+
"""
2373+
2374+
skip_interstitial: bool
2375+
"""Enables automatic authentication through cloudflared."""
2376+
2377+
tags: List[str]
2378+
"""The tags you want assigned to an application.
2379+
2380+
Tags are used to filter applications in the App Launcher dashboard.
2381+
"""
2382+
2383+
2384+
class BrowserRdpApplicationTargetCriterion(TypedDict, total=False):
2385+
port: Required[int]
2386+
"""The port that the targets use for the chosen communication protocol.
2387+
2388+
A port cannot be assigned to multiple protocols.
2389+
"""
2390+
2391+
protocol: Required[Literal["ssh"]]
2392+
"""The communication protocol your application secures."""
2393+
2394+
target_attributes: Required[Dict[str, List[str]]]
2395+
"""Contains a map of target attribute keys to target attribute values."""
2396+
2397+
2398+
class BrowserRdpApplicationDestinationPublicDestination(TypedDict, total=False):
2399+
type: Literal["public"]
2400+
2401+
uri: str
2402+
"""The URI of the destination.
2403+
2404+
Public destinations' URIs can include a domain and path with
2405+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2406+
"""
2407+
2408+
2409+
class BrowserRdpApplicationDestinationPrivateDestination(TypedDict, total=False):
2410+
cidr: str
2411+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2412+
2413+
hostname: str
2414+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2415+
2416+
l4_protocol: Literal["tcp", "udp"]
2417+
"""The L4 protocol of the destination.
2418+
2419+
When omitted, both UDP and TCP traffic will match.
2420+
"""
2421+
2422+
port_range: str
2423+
"""The port range of the destination.
2424+
2425+
Can be a single port or a range of ports. When omitted, all ports will match.
2426+
"""
2427+
2428+
type: Literal["private"]
2429+
2430+
vnet_id: str
2431+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2432+
2433+
2434+
BrowserRdpApplicationDestination: TypeAlias = Union[
2435+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2436+
]
2437+
2438+
2439+
class BrowserRdpApplicationPolicyAccessAppPolicyLink(TypedDict, total=False):
2440+
id: str
2441+
"""The UUID of the policy"""
2442+
2443+
precedence: int
2444+
"""The order of execution for this policy.
2445+
2446+
Must be unique for each policy within an app.
2447+
"""
2448+
2449+
2450+
class BrowserRdpApplicationPolicyUnionMember2(TypedDict, total=False):
2451+
id: str
2452+
"""The UUID of the policy"""
2453+
2454+
approval_groups: Iterable[ApprovalGroupParam]
2455+
"""Administrators who can approve a temporary authentication request."""
2456+
2457+
approval_required: bool
2458+
"""
2459+
Requires the user to request access from an administrator at the start of each
2460+
session.
2461+
"""
2462+
2463+
isolation_required: bool
2464+
"""
2465+
Require this application to be served in an isolated browser for users matching
2466+
this policy. 'Client Web Isolation' must be on for the account in order to use
2467+
this feature.
2468+
"""
2469+
2470+
precedence: int
2471+
"""The order of execution for this policy.
2472+
2473+
Must be unique for each policy within an app.
2474+
"""
2475+
2476+
purpose_justification_prompt: str
2477+
"""A custom message that will appear on the purpose justification screen."""
2478+
2479+
purpose_justification_required: bool
2480+
"""Require users to enter a justification when they log in to the application."""
2481+
2482+
session_duration: str
2483+
"""The amount of time that tokens issued for the application will be valid.
2484+
2485+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2486+
ms, s, m, h.
2487+
"""
2488+
2489+
2490+
BrowserRdpApplicationPolicy: TypeAlias = Union[
2491+
BrowserRdpApplicationPolicyAccessAppPolicyLink, str, BrowserRdpApplicationPolicyUnionMember2
2492+
]
2493+
2494+
2495+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2496+
TypedDict, total=False
2497+
):
2498+
client_id: Required[str]
2499+
"""
2500+
Client ID of the Access service token used to authenticate with the remote
2501+
service.
2502+
"""
2503+
2504+
client_secret: Required[str]
2505+
"""
2506+
Client secret of the Access service token used to authenticate with the remote
2507+
service.
2508+
"""
2509+
2510+
scheme: Required[Literal["access_service_token"]]
2511+
"""The authentication scheme to use when making SCIM requests to this application."""
2512+
2513+
2514+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2515+
TypedDict, total=False
2516+
):
2517+
client_id: Required[str]
2518+
"""
2519+
Client ID of the Access service token used to authenticate with the remote
2520+
service.
2521+
"""
2522+
2523+
client_secret: Required[str]
2524+
"""
2525+
Client secret of the Access service token used to authenticate with the remote
2526+
service.
2527+
"""
2528+
2529+
scheme: Required[Literal["access_service_token"]]
2530+
"""The authentication scheme to use when making SCIM requests to this application."""
2531+
2532+
2533+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2534+
SCIMConfigAuthenticationHTTPBasicParam,
2535+
SCIMConfigAuthenticationOAuthBearerTokenParam,
2536+
SCIMConfigAuthenticationOauth2Param,
2537+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2538+
]
2539+
2540+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2541+
SCIMConfigAuthenticationHTTPBasicParam,
2542+
SCIMConfigAuthenticationOAuthBearerTokenParam,
2543+
SCIMConfigAuthenticationOauth2Param,
2544+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2545+
Iterable[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2546+
]
2547+
2548+
2549+
class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
2550+
idp_uid: Required[str]
2551+
"""
2552+
The UID of the IdP to use as the source for SCIM resources to provision to this
2553+
application.
2554+
"""
2555+
2556+
remote_uri: Required[str]
2557+
"""The base URI for the application's SCIM-compatible API."""
2558+
2559+
authentication: BrowserRdpApplicationSCIMConfigAuthentication
2560+
"""
2561+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2562+
provisioning to an application.
2563+
"""
2564+
2565+
deactivate_on_delete: bool
2566+
"""
2567+
If false, propagates DELETE requests to the target application for SCIM
2568+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2569+
targets do not support DELETE operations.
2570+
"""
2571+
2572+
enabled: bool
2573+
"""Whether SCIM provisioning is turned on for this application."""
2574+
2575+
mappings: Iterable[SCIMConfigMappingParam]
2576+
"""
2577+
A list of mappings to apply to SCIM resources before provisioning them in this
2578+
application. These can transform or filter the resources to be provisioned.
2579+
"""
2580+
2581+
22202582
ApplicationCreateParams: TypeAlias = Union[
22212583
SelfHostedApplication,
22222584
SaaSApplication,
@@ -2227,4 +2589,5 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22272589
BrowserIsolationPermissionsApplication,
22282590
BookmarkApplication,
22292591
InfrastructureApplication,
2592+
BrowserRdpApplication,
22302593
]

‎src/cloudflare/types/zero_trust/access/application_create_response.py

+310
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,17 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105+
"BrowserRdpApplication",
106+
"BrowserRdpApplicationTargetCriterion",
107+
"BrowserRdpApplicationDestination",
108+
"BrowserRdpApplicationDestinationPublicDestination",
109+
"BrowserRdpApplicationDestinationPrivateDestination",
110+
"BrowserRdpApplicationPolicy",
111+
"BrowserRdpApplicationSCIMConfig",
112+
"BrowserRdpApplicationSCIMConfigAuthentication",
113+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105116
]
106117

107118

@@ -1984,6 +1995,304 @@ class InfrastructureApplication(BaseModel):
19841995
updated_at: Optional[datetime] = None
19851996

19861997

1998+
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999+
port: int
2000+
"""The port that the targets use for the chosen communication protocol.
2001+
2002+
A port cannot be assigned to multiple protocols.
2003+
"""
2004+
2005+
protocol: Literal["ssh"]
2006+
"""The communication protocol your application secures."""
2007+
2008+
target_attributes: Dict[str, List[str]]
2009+
"""Contains a map of target attribute keys to target attribute values."""
2010+
2011+
2012+
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013+
type: Optional[Literal["public"]] = None
2014+
2015+
uri: Optional[str] = None
2016+
"""The URI of the destination.
2017+
2018+
Public destinations' URIs can include a domain and path with
2019+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020+
"""
2021+
2022+
2023+
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024+
cidr: Optional[str] = None
2025+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026+
2027+
hostname: Optional[str] = None
2028+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029+
2030+
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031+
"""The L4 protocol of the destination.
2032+
2033+
When omitted, both UDP and TCP traffic will match.
2034+
"""
2035+
2036+
port_range: Optional[str] = None
2037+
"""The port range of the destination.
2038+
2039+
Can be a single port or a range of ports. When omitted, all ports will match.
2040+
"""
2041+
2042+
type: Optional[Literal["private"]] = None
2043+
2044+
vnet_id: Optional[str] = None
2045+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046+
2047+
2048+
BrowserRdpApplicationDestination: TypeAlias = Union[
2049+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050+
]
2051+
2052+
2053+
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054+
precedence: Optional[int] = None
2055+
"""The order of execution for this policy.
2056+
2057+
Must be unique for each policy within an app.
2058+
"""
2059+
2060+
2061+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062+
client_id: str
2063+
"""
2064+
Client ID of the Access service token used to authenticate with the remote
2065+
service.
2066+
"""
2067+
2068+
client_secret: str
2069+
"""
2070+
Client secret of the Access service token used to authenticate with the remote
2071+
service.
2072+
"""
2073+
2074+
scheme: Literal["access_service_token"]
2075+
"""The authentication scheme to use when making SCIM requests to this application."""
2076+
2077+
2078+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079+
BaseModel
2080+
):
2081+
client_id: str
2082+
"""
2083+
Client ID of the Access service token used to authenticate with the remote
2084+
service.
2085+
"""
2086+
2087+
client_secret: str
2088+
"""
2089+
Client secret of the Access service token used to authenticate with the remote
2090+
service.
2091+
"""
2092+
2093+
scheme: Literal["access_service_token"]
2094+
"""The authentication scheme to use when making SCIM requests to this application."""
2095+
2096+
2097+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098+
SCIMConfigAuthenticationHTTPBasic,
2099+
SCIMConfigAuthenticationOAuthBearerToken,
2100+
SCIMConfigAuthenticationOauth2,
2101+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102+
]
2103+
2104+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105+
SCIMConfigAuthenticationHTTPBasic,
2106+
SCIMConfigAuthenticationOAuthBearerToken,
2107+
SCIMConfigAuthenticationOauth2,
2108+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109+
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110+
]
2111+
2112+
2113+
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114+
idp_uid: str
2115+
"""
2116+
The UID of the IdP to use as the source for SCIM resources to provision to this
2117+
application.
2118+
"""
2119+
2120+
remote_uri: str
2121+
"""The base URI for the application's SCIM-compatible API."""
2122+
2123+
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124+
"""
2125+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126+
provisioning to an application.
2127+
"""
2128+
2129+
deactivate_on_delete: Optional[bool] = None
2130+
"""
2131+
If false, propagates DELETE requests to the target application for SCIM
2132+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133+
targets do not support DELETE operations.
2134+
"""
2135+
2136+
enabled: Optional[bool] = None
2137+
"""Whether SCIM provisioning is turned on for this application."""
2138+
2139+
mappings: Optional[List[SCIMConfigMapping]] = None
2140+
"""
2141+
A list of mappings to apply to SCIM resources before provisioning them in this
2142+
application. These can transform or filter the resources to be provisioned.
2143+
"""
2144+
2145+
2146+
class BrowserRdpApplication(BaseModel):
2147+
domain: str
2148+
"""The primary hostname and path secured by Access.
2149+
2150+
This domain will be displayed if the app is visible in the App Launcher.
2151+
"""
2152+
2153+
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154+
2155+
type: str
2156+
"""The application type."""
2157+
2158+
id: Optional[str] = None
2159+
"""UUID"""
2160+
2161+
allow_authenticate_via_warp: Optional[bool] = None
2162+
"""
2163+
When set to true, users can authenticate to this application using their WARP
2164+
session. When set to false this application will always require direct IdP
2165+
authentication. This setting always overrides the organization setting for WARP
2166+
authentication.
2167+
"""
2168+
2169+
allowed_idps: Optional[List[AllowedIdPs]] = None
2170+
"""The identity providers your users can select when connecting to this
2171+
application.
2172+
2173+
Defaults to all IdPs configured in your account.
2174+
"""
2175+
2176+
app_launcher_visible: Optional[bool] = None
2177+
"""Displays the application in the App Launcher."""
2178+
2179+
aud: Optional[str] = None
2180+
"""Audience tag."""
2181+
2182+
auto_redirect_to_identity: Optional[bool] = None
2183+
"""When set to `true`, users skip the identity provider selection step during
2184+
login.
2185+
2186+
You must specify only one identity provider in allowed_idps.
2187+
"""
2188+
2189+
cors_headers: Optional[CORSHeaders] = None
2190+
2191+
created_at: Optional[datetime] = None
2192+
2193+
custom_deny_message: Optional[str] = None
2194+
"""
2195+
The custom error message shown to a user when they are denied access to the
2196+
application.
2197+
"""
2198+
2199+
custom_deny_url: Optional[str] = None
2200+
"""
2201+
The custom URL a user is redirected to when they are denied access to the
2202+
application when failing identity-based rules.
2203+
"""
2204+
2205+
custom_non_identity_deny_url: Optional[str] = None
2206+
"""
2207+
The custom URL a user is redirected to when they are denied access to the
2208+
application when failing non-identity rules.
2209+
"""
2210+
2211+
custom_pages: Optional[List[str]] = None
2212+
"""The custom pages that will be displayed when applicable for this application"""
2213+
2214+
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215+
"""List of destinations secured by Access.
2216+
2217+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218+
different types of domains. If `destinations` are provided, then
2219+
`self_hosted_domains` will be ignored.
2220+
"""
2221+
2222+
enable_binding_cookie: Optional[bool] = None
2223+
"""
2224+
Enables the binding cookie, which increases security against compromised
2225+
authorization tokens and CSRF attacks.
2226+
"""
2227+
2228+
http_only_cookie_attribute: Optional[bool] = None
2229+
"""
2230+
Enables the HttpOnly cookie attribute, which increases security against XSS
2231+
attacks.
2232+
"""
2233+
2234+
logo_url: Optional[str] = None
2235+
"""The image URL for the logo shown in the App Launcher dashboard."""
2236+
2237+
name: Optional[str] = None
2238+
"""The name of the application."""
2239+
2240+
options_preflight_bypass: Optional[bool] = None
2241+
"""
2242+
Allows options preflight requests to bypass Access authentication and go
2243+
directly to the origin. Cannot turn on if cors_headers is set.
2244+
"""
2245+
2246+
path_cookie_attribute: Optional[bool] = None
2247+
"""Enables cookie paths to scope an application's JWT to the application path.
2248+
2249+
If disabled, the JWT will scope to the hostname by default
2250+
"""
2251+
2252+
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253+
2254+
same_site_cookie_attribute: Optional[str] = None
2255+
"""
2256+
Sets the SameSite cookie setting, which provides increased security against CSRF
2257+
attacks.
2258+
"""
2259+
2260+
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261+
"""Configuration for provisioning to this application via SCIM.
2262+
2263+
This is currently in closed beta.
2264+
"""
2265+
2266+
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267+
"""List of public domains that Access will secure.
2268+
2269+
This field is deprecated in favor of `destinations` and will be supported until
2270+
**November 21, 2025.** If `destinations` are provided, then
2271+
`self_hosted_domains` will be ignored.
2272+
"""
2273+
2274+
service_auth_401_redirect: Optional[bool] = None
2275+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276+
2277+
session_duration: Optional[str] = None
2278+
"""The amount of time that tokens issued for this application will be valid.
2279+
2280+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281+
ms, s, m, h.
2282+
"""
2283+
2284+
skip_interstitial: Optional[bool] = None
2285+
"""Enables automatic authentication through cloudflared."""
2286+
2287+
tags: Optional[List[str]] = None
2288+
"""The tags you want assigned to an application.
2289+
2290+
Tags are used to filter applications in the App Launcher dashboard.
2291+
"""
2292+
2293+
updated_at: Optional[datetime] = None
2294+
2295+
19872296
ApplicationCreateResponse: TypeAlias = Union[
19882297
SelfHostedApplication,
19892298
SaaSApplication,
@@ -1994,4 +2303,5 @@ class InfrastructureApplication(BaseModel):
19942303
BrowserIsolationPermissionsApplication,
19952304
BookmarkApplication,
19962305
InfrastructureApplication,
2306+
BrowserRdpApplication,
19972307
]

‎src/cloudflare/types/zero_trust/access/application_get_response.py

+310
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,17 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105+
"BrowserRdpApplication",
106+
"BrowserRdpApplicationTargetCriterion",
107+
"BrowserRdpApplicationDestination",
108+
"BrowserRdpApplicationDestinationPublicDestination",
109+
"BrowserRdpApplicationDestinationPrivateDestination",
110+
"BrowserRdpApplicationPolicy",
111+
"BrowserRdpApplicationSCIMConfig",
112+
"BrowserRdpApplicationSCIMConfigAuthentication",
113+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105116
]
106117

107118

@@ -1984,6 +1995,304 @@ class InfrastructureApplication(BaseModel):
19841995
updated_at: Optional[datetime] = None
19851996

19861997

1998+
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999+
port: int
2000+
"""The port that the targets use for the chosen communication protocol.
2001+
2002+
A port cannot be assigned to multiple protocols.
2003+
"""
2004+
2005+
protocol: Literal["ssh"]
2006+
"""The communication protocol your application secures."""
2007+
2008+
target_attributes: Dict[str, List[str]]
2009+
"""Contains a map of target attribute keys to target attribute values."""
2010+
2011+
2012+
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013+
type: Optional[Literal["public"]] = None
2014+
2015+
uri: Optional[str] = None
2016+
"""The URI of the destination.
2017+
2018+
Public destinations' URIs can include a domain and path with
2019+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020+
"""
2021+
2022+
2023+
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024+
cidr: Optional[str] = None
2025+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026+
2027+
hostname: Optional[str] = None
2028+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029+
2030+
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031+
"""The L4 protocol of the destination.
2032+
2033+
When omitted, both UDP and TCP traffic will match.
2034+
"""
2035+
2036+
port_range: Optional[str] = None
2037+
"""The port range of the destination.
2038+
2039+
Can be a single port or a range of ports. When omitted, all ports will match.
2040+
"""
2041+
2042+
type: Optional[Literal["private"]] = None
2043+
2044+
vnet_id: Optional[str] = None
2045+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046+
2047+
2048+
BrowserRdpApplicationDestination: TypeAlias = Union[
2049+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050+
]
2051+
2052+
2053+
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054+
precedence: Optional[int] = None
2055+
"""The order of execution for this policy.
2056+
2057+
Must be unique for each policy within an app.
2058+
"""
2059+
2060+
2061+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062+
client_id: str
2063+
"""
2064+
Client ID of the Access service token used to authenticate with the remote
2065+
service.
2066+
"""
2067+
2068+
client_secret: str
2069+
"""
2070+
Client secret of the Access service token used to authenticate with the remote
2071+
service.
2072+
"""
2073+
2074+
scheme: Literal["access_service_token"]
2075+
"""The authentication scheme to use when making SCIM requests to this application."""
2076+
2077+
2078+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079+
BaseModel
2080+
):
2081+
client_id: str
2082+
"""
2083+
Client ID of the Access service token used to authenticate with the remote
2084+
service.
2085+
"""
2086+
2087+
client_secret: str
2088+
"""
2089+
Client secret of the Access service token used to authenticate with the remote
2090+
service.
2091+
"""
2092+
2093+
scheme: Literal["access_service_token"]
2094+
"""The authentication scheme to use when making SCIM requests to this application."""
2095+
2096+
2097+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098+
SCIMConfigAuthenticationHTTPBasic,
2099+
SCIMConfigAuthenticationOAuthBearerToken,
2100+
SCIMConfigAuthenticationOauth2,
2101+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102+
]
2103+
2104+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105+
SCIMConfigAuthenticationHTTPBasic,
2106+
SCIMConfigAuthenticationOAuthBearerToken,
2107+
SCIMConfigAuthenticationOauth2,
2108+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109+
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110+
]
2111+
2112+
2113+
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114+
idp_uid: str
2115+
"""
2116+
The UID of the IdP to use as the source for SCIM resources to provision to this
2117+
application.
2118+
"""
2119+
2120+
remote_uri: str
2121+
"""The base URI for the application's SCIM-compatible API."""
2122+
2123+
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124+
"""
2125+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126+
provisioning to an application.
2127+
"""
2128+
2129+
deactivate_on_delete: Optional[bool] = None
2130+
"""
2131+
If false, propagates DELETE requests to the target application for SCIM
2132+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133+
targets do not support DELETE operations.
2134+
"""
2135+
2136+
enabled: Optional[bool] = None
2137+
"""Whether SCIM provisioning is turned on for this application."""
2138+
2139+
mappings: Optional[List[SCIMConfigMapping]] = None
2140+
"""
2141+
A list of mappings to apply to SCIM resources before provisioning them in this
2142+
application. These can transform or filter the resources to be provisioned.
2143+
"""
2144+
2145+
2146+
class BrowserRdpApplication(BaseModel):
2147+
domain: str
2148+
"""The primary hostname and path secured by Access.
2149+
2150+
This domain will be displayed if the app is visible in the App Launcher.
2151+
"""
2152+
2153+
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154+
2155+
type: str
2156+
"""The application type."""
2157+
2158+
id: Optional[str] = None
2159+
"""UUID"""
2160+
2161+
allow_authenticate_via_warp: Optional[bool] = None
2162+
"""
2163+
When set to true, users can authenticate to this application using their WARP
2164+
session. When set to false this application will always require direct IdP
2165+
authentication. This setting always overrides the organization setting for WARP
2166+
authentication.
2167+
"""
2168+
2169+
allowed_idps: Optional[List[AllowedIdPs]] = None
2170+
"""The identity providers your users can select when connecting to this
2171+
application.
2172+
2173+
Defaults to all IdPs configured in your account.
2174+
"""
2175+
2176+
app_launcher_visible: Optional[bool] = None
2177+
"""Displays the application in the App Launcher."""
2178+
2179+
aud: Optional[str] = None
2180+
"""Audience tag."""
2181+
2182+
auto_redirect_to_identity: Optional[bool] = None
2183+
"""When set to `true`, users skip the identity provider selection step during
2184+
login.
2185+
2186+
You must specify only one identity provider in allowed_idps.
2187+
"""
2188+
2189+
cors_headers: Optional[CORSHeaders] = None
2190+
2191+
created_at: Optional[datetime] = None
2192+
2193+
custom_deny_message: Optional[str] = None
2194+
"""
2195+
The custom error message shown to a user when they are denied access to the
2196+
application.
2197+
"""
2198+
2199+
custom_deny_url: Optional[str] = None
2200+
"""
2201+
The custom URL a user is redirected to when they are denied access to the
2202+
application when failing identity-based rules.
2203+
"""
2204+
2205+
custom_non_identity_deny_url: Optional[str] = None
2206+
"""
2207+
The custom URL a user is redirected to when they are denied access to the
2208+
application when failing non-identity rules.
2209+
"""
2210+
2211+
custom_pages: Optional[List[str]] = None
2212+
"""The custom pages that will be displayed when applicable for this application"""
2213+
2214+
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215+
"""List of destinations secured by Access.
2216+
2217+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218+
different types of domains. If `destinations` are provided, then
2219+
`self_hosted_domains` will be ignored.
2220+
"""
2221+
2222+
enable_binding_cookie: Optional[bool] = None
2223+
"""
2224+
Enables the binding cookie, which increases security against compromised
2225+
authorization tokens and CSRF attacks.
2226+
"""
2227+
2228+
http_only_cookie_attribute: Optional[bool] = None
2229+
"""
2230+
Enables the HttpOnly cookie attribute, which increases security against XSS
2231+
attacks.
2232+
"""
2233+
2234+
logo_url: Optional[str] = None
2235+
"""The image URL for the logo shown in the App Launcher dashboard."""
2236+
2237+
name: Optional[str] = None
2238+
"""The name of the application."""
2239+
2240+
options_preflight_bypass: Optional[bool] = None
2241+
"""
2242+
Allows options preflight requests to bypass Access authentication and go
2243+
directly to the origin. Cannot turn on if cors_headers is set.
2244+
"""
2245+
2246+
path_cookie_attribute: Optional[bool] = None
2247+
"""Enables cookie paths to scope an application's JWT to the application path.
2248+
2249+
If disabled, the JWT will scope to the hostname by default
2250+
"""
2251+
2252+
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253+
2254+
same_site_cookie_attribute: Optional[str] = None
2255+
"""
2256+
Sets the SameSite cookie setting, which provides increased security against CSRF
2257+
attacks.
2258+
"""
2259+
2260+
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261+
"""Configuration for provisioning to this application via SCIM.
2262+
2263+
This is currently in closed beta.
2264+
"""
2265+
2266+
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267+
"""List of public domains that Access will secure.
2268+
2269+
This field is deprecated in favor of `destinations` and will be supported until
2270+
**November 21, 2025.** If `destinations` are provided, then
2271+
`self_hosted_domains` will be ignored.
2272+
"""
2273+
2274+
service_auth_401_redirect: Optional[bool] = None
2275+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276+
2277+
session_duration: Optional[str] = None
2278+
"""The amount of time that tokens issued for this application will be valid.
2279+
2280+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281+
ms, s, m, h.
2282+
"""
2283+
2284+
skip_interstitial: Optional[bool] = None
2285+
"""Enables automatic authentication through cloudflared."""
2286+
2287+
tags: Optional[List[str]] = None
2288+
"""The tags you want assigned to an application.
2289+
2290+
Tags are used to filter applications in the App Launcher dashboard.
2291+
"""
2292+
2293+
updated_at: Optional[datetime] = None
2294+
2295+
19872296
ApplicationGetResponse: TypeAlias = Union[
19882297
SelfHostedApplication,
19892298
SaaSApplication,
@@ -1994,4 +2303,5 @@ class InfrastructureApplication(BaseModel):
19942303
BrowserIsolationPermissionsApplication,
19952304
BookmarkApplication,
19962305
InfrastructureApplication,
2306+
BrowserRdpApplication,
19972307
]

‎src/cloudflare/types/zero_trust/access/application_list_response.py

+310
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,17 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105+
"BrowserRdpApplication",
106+
"BrowserRdpApplicationTargetCriterion",
107+
"BrowserRdpApplicationDestination",
108+
"BrowserRdpApplicationDestinationPublicDestination",
109+
"BrowserRdpApplicationDestinationPrivateDestination",
110+
"BrowserRdpApplicationPolicy",
111+
"BrowserRdpApplicationSCIMConfig",
112+
"BrowserRdpApplicationSCIMConfigAuthentication",
113+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105116
]
106117

107118

@@ -1984,6 +1995,304 @@ class InfrastructureApplication(BaseModel):
19841995
updated_at: Optional[datetime] = None
19851996

19861997

1998+
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999+
port: int
2000+
"""The port that the targets use for the chosen communication protocol.
2001+
2002+
A port cannot be assigned to multiple protocols.
2003+
"""
2004+
2005+
protocol: Literal["ssh"]
2006+
"""The communication protocol your application secures."""
2007+
2008+
target_attributes: Dict[str, List[str]]
2009+
"""Contains a map of target attribute keys to target attribute values."""
2010+
2011+
2012+
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013+
type: Optional[Literal["public"]] = None
2014+
2015+
uri: Optional[str] = None
2016+
"""The URI of the destination.
2017+
2018+
Public destinations' URIs can include a domain and path with
2019+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020+
"""
2021+
2022+
2023+
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024+
cidr: Optional[str] = None
2025+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026+
2027+
hostname: Optional[str] = None
2028+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029+
2030+
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031+
"""The L4 protocol of the destination.
2032+
2033+
When omitted, both UDP and TCP traffic will match.
2034+
"""
2035+
2036+
port_range: Optional[str] = None
2037+
"""The port range of the destination.
2038+
2039+
Can be a single port or a range of ports. When omitted, all ports will match.
2040+
"""
2041+
2042+
type: Optional[Literal["private"]] = None
2043+
2044+
vnet_id: Optional[str] = None
2045+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046+
2047+
2048+
BrowserRdpApplicationDestination: TypeAlias = Union[
2049+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050+
]
2051+
2052+
2053+
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054+
precedence: Optional[int] = None
2055+
"""The order of execution for this policy.
2056+
2057+
Must be unique for each policy within an app.
2058+
"""
2059+
2060+
2061+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062+
client_id: str
2063+
"""
2064+
Client ID of the Access service token used to authenticate with the remote
2065+
service.
2066+
"""
2067+
2068+
client_secret: str
2069+
"""
2070+
Client secret of the Access service token used to authenticate with the remote
2071+
service.
2072+
"""
2073+
2074+
scheme: Literal["access_service_token"]
2075+
"""The authentication scheme to use when making SCIM requests to this application."""
2076+
2077+
2078+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079+
BaseModel
2080+
):
2081+
client_id: str
2082+
"""
2083+
Client ID of the Access service token used to authenticate with the remote
2084+
service.
2085+
"""
2086+
2087+
client_secret: str
2088+
"""
2089+
Client secret of the Access service token used to authenticate with the remote
2090+
service.
2091+
"""
2092+
2093+
scheme: Literal["access_service_token"]
2094+
"""The authentication scheme to use when making SCIM requests to this application."""
2095+
2096+
2097+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098+
SCIMConfigAuthenticationHTTPBasic,
2099+
SCIMConfigAuthenticationOAuthBearerToken,
2100+
SCIMConfigAuthenticationOauth2,
2101+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102+
]
2103+
2104+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105+
SCIMConfigAuthenticationHTTPBasic,
2106+
SCIMConfigAuthenticationOAuthBearerToken,
2107+
SCIMConfigAuthenticationOauth2,
2108+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109+
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110+
]
2111+
2112+
2113+
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114+
idp_uid: str
2115+
"""
2116+
The UID of the IdP to use as the source for SCIM resources to provision to this
2117+
application.
2118+
"""
2119+
2120+
remote_uri: str
2121+
"""The base URI for the application's SCIM-compatible API."""
2122+
2123+
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124+
"""
2125+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126+
provisioning to an application.
2127+
"""
2128+
2129+
deactivate_on_delete: Optional[bool] = None
2130+
"""
2131+
If false, propagates DELETE requests to the target application for SCIM
2132+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133+
targets do not support DELETE operations.
2134+
"""
2135+
2136+
enabled: Optional[bool] = None
2137+
"""Whether SCIM provisioning is turned on for this application."""
2138+
2139+
mappings: Optional[List[SCIMConfigMapping]] = None
2140+
"""
2141+
A list of mappings to apply to SCIM resources before provisioning them in this
2142+
application. These can transform or filter the resources to be provisioned.
2143+
"""
2144+
2145+
2146+
class BrowserRdpApplication(BaseModel):
2147+
domain: str
2148+
"""The primary hostname and path secured by Access.
2149+
2150+
This domain will be displayed if the app is visible in the App Launcher.
2151+
"""
2152+
2153+
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154+
2155+
type: str
2156+
"""The application type."""
2157+
2158+
id: Optional[str] = None
2159+
"""UUID"""
2160+
2161+
allow_authenticate_via_warp: Optional[bool] = None
2162+
"""
2163+
When set to true, users can authenticate to this application using their WARP
2164+
session. When set to false this application will always require direct IdP
2165+
authentication. This setting always overrides the organization setting for WARP
2166+
authentication.
2167+
"""
2168+
2169+
allowed_idps: Optional[List[AllowedIdPs]] = None
2170+
"""The identity providers your users can select when connecting to this
2171+
application.
2172+
2173+
Defaults to all IdPs configured in your account.
2174+
"""
2175+
2176+
app_launcher_visible: Optional[bool] = None
2177+
"""Displays the application in the App Launcher."""
2178+
2179+
aud: Optional[str] = None
2180+
"""Audience tag."""
2181+
2182+
auto_redirect_to_identity: Optional[bool] = None
2183+
"""When set to `true`, users skip the identity provider selection step during
2184+
login.
2185+
2186+
You must specify only one identity provider in allowed_idps.
2187+
"""
2188+
2189+
cors_headers: Optional[CORSHeaders] = None
2190+
2191+
created_at: Optional[datetime] = None
2192+
2193+
custom_deny_message: Optional[str] = None
2194+
"""
2195+
The custom error message shown to a user when they are denied access to the
2196+
application.
2197+
"""
2198+
2199+
custom_deny_url: Optional[str] = None
2200+
"""
2201+
The custom URL a user is redirected to when they are denied access to the
2202+
application when failing identity-based rules.
2203+
"""
2204+
2205+
custom_non_identity_deny_url: Optional[str] = None
2206+
"""
2207+
The custom URL a user is redirected to when they are denied access to the
2208+
application when failing non-identity rules.
2209+
"""
2210+
2211+
custom_pages: Optional[List[str]] = None
2212+
"""The custom pages that will be displayed when applicable for this application"""
2213+
2214+
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215+
"""List of destinations secured by Access.
2216+
2217+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218+
different types of domains. If `destinations` are provided, then
2219+
`self_hosted_domains` will be ignored.
2220+
"""
2221+
2222+
enable_binding_cookie: Optional[bool] = None
2223+
"""
2224+
Enables the binding cookie, which increases security against compromised
2225+
authorization tokens and CSRF attacks.
2226+
"""
2227+
2228+
http_only_cookie_attribute: Optional[bool] = None
2229+
"""
2230+
Enables the HttpOnly cookie attribute, which increases security against XSS
2231+
attacks.
2232+
"""
2233+
2234+
logo_url: Optional[str] = None
2235+
"""The image URL for the logo shown in the App Launcher dashboard."""
2236+
2237+
name: Optional[str] = None
2238+
"""The name of the application."""
2239+
2240+
options_preflight_bypass: Optional[bool] = None
2241+
"""
2242+
Allows options preflight requests to bypass Access authentication and go
2243+
directly to the origin. Cannot turn on if cors_headers is set.
2244+
"""
2245+
2246+
path_cookie_attribute: Optional[bool] = None
2247+
"""Enables cookie paths to scope an application's JWT to the application path.
2248+
2249+
If disabled, the JWT will scope to the hostname by default
2250+
"""
2251+
2252+
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253+
2254+
same_site_cookie_attribute: Optional[str] = None
2255+
"""
2256+
Sets the SameSite cookie setting, which provides increased security against CSRF
2257+
attacks.
2258+
"""
2259+
2260+
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261+
"""Configuration for provisioning to this application via SCIM.
2262+
2263+
This is currently in closed beta.
2264+
"""
2265+
2266+
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267+
"""List of public domains that Access will secure.
2268+
2269+
This field is deprecated in favor of `destinations` and will be supported until
2270+
**November 21, 2025.** If `destinations` are provided, then
2271+
`self_hosted_domains` will be ignored.
2272+
"""
2273+
2274+
service_auth_401_redirect: Optional[bool] = None
2275+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276+
2277+
session_duration: Optional[str] = None
2278+
"""The amount of time that tokens issued for this application will be valid.
2279+
2280+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281+
ms, s, m, h.
2282+
"""
2283+
2284+
skip_interstitial: Optional[bool] = None
2285+
"""Enables automatic authentication through cloudflared."""
2286+
2287+
tags: Optional[List[str]] = None
2288+
"""The tags you want assigned to an application.
2289+
2290+
Tags are used to filter applications in the App Launcher dashboard.
2291+
"""
2292+
2293+
updated_at: Optional[datetime] = None
2294+
2295+
19872296
ApplicationListResponse: TypeAlias = Union[
19882297
SelfHostedApplication,
19892298
SaaSApplication,
@@ -1994,4 +2303,5 @@ class InfrastructureApplication(BaseModel):
19942303
BrowserIsolationPermissionsApplication,
19952304
BookmarkApplication,
19962305
InfrastructureApplication,
2306+
BrowserRdpApplication,
19972307
]

‎src/cloudflare/types/zero_trust/access/application_type.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,5 @@
55
__all__ = ["ApplicationType"]
66

77
ApplicationType: TypeAlias = Literal[
8-
"self_hosted", "saas", "ssh", "vnc", "app_launcher", "warp", "biso", "bookmark", "dash_sso", "infrastructure"
8+
"self_hosted", "saas", "ssh", "vnc", "app_launcher", "warp", "biso", "bookmark", "dash_sso", "infrastructure", "rdp"
99
]

‎src/cloudflare/types/zero_trust/access/application_update_params.py

+363
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,19 @@
111111
"InfrastructureApplicationPolicy",
112112
"InfrastructureApplicationPolicyConnectionRules",
113113
"InfrastructureApplicationPolicyConnectionRulesSSH",
114+
"BrowserRdpApplication",
115+
"BrowserRdpApplicationTargetCriterion",
116+
"BrowserRdpApplicationDestination",
117+
"BrowserRdpApplicationDestinationPublicDestination",
118+
"BrowserRdpApplicationDestinationPrivateDestination",
119+
"BrowserRdpApplicationPolicy",
120+
"BrowserRdpApplicationPolicyAccessAppPolicyLink",
121+
"BrowserRdpApplicationPolicyUnionMember2",
122+
"BrowserRdpApplicationSCIMConfig",
123+
"BrowserRdpApplicationSCIMConfigAuthentication",
124+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
125+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
126+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114127
]
115128

116129

@@ -2217,6 +2230,355 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22172230
"""
22182231

22192232

2233+
class BrowserRdpApplication(TypedDict, total=False):
2234+
domain: Required[str]
2235+
"""The primary hostname and path secured by Access.
2236+
2237+
This domain will be displayed if the app is visible in the App Launcher.
2238+
"""
2239+
2240+
target_criteria: Required[Iterable[BrowserRdpApplicationTargetCriterion]]
2241+
2242+
type: Required[str]
2243+
"""The application type."""
2244+
2245+
account_id: str
2246+
"""The Account ID to use for this endpoint. Mutually exclusive with the Zone ID."""
2247+
2248+
zone_id: str
2249+
"""The Zone ID to use for this endpoint. Mutually exclusive with the Account ID."""
2250+
2251+
allow_authenticate_via_warp: bool
2252+
"""
2253+
When set to true, users can authenticate to this application using their WARP
2254+
session. When set to false this application will always require direct IdP
2255+
authentication. This setting always overrides the organization setting for WARP
2256+
authentication.
2257+
"""
2258+
2259+
allowed_idps: List[AllowedIdPs]
2260+
"""The identity providers your users can select when connecting to this
2261+
application.
2262+
2263+
Defaults to all IdPs configured in your account.
2264+
"""
2265+
2266+
app_launcher_visible: bool
2267+
"""Displays the application in the App Launcher."""
2268+
2269+
auto_redirect_to_identity: bool
2270+
"""When set to `true`, users skip the identity provider selection step during
2271+
login.
2272+
2273+
You must specify only one identity provider in allowed_idps.
2274+
"""
2275+
2276+
cors_headers: CORSHeadersParam
2277+
2278+
custom_deny_message: str
2279+
"""
2280+
The custom error message shown to a user when they are denied access to the
2281+
application.
2282+
"""
2283+
2284+
custom_deny_url: str
2285+
"""
2286+
The custom URL a user is redirected to when they are denied access to the
2287+
application when failing identity-based rules.
2288+
"""
2289+
2290+
custom_non_identity_deny_url: str
2291+
"""
2292+
The custom URL a user is redirected to when they are denied access to the
2293+
application when failing non-identity rules.
2294+
"""
2295+
2296+
custom_pages: List[str]
2297+
"""The custom pages that will be displayed when applicable for this application"""
2298+
2299+
destinations: Iterable[BrowserRdpApplicationDestination]
2300+
"""List of destinations secured by Access.
2301+
2302+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2303+
different types of domains. If `destinations` are provided, then
2304+
`self_hosted_domains` will be ignored.
2305+
"""
2306+
2307+
enable_binding_cookie: bool
2308+
"""
2309+
Enables the binding cookie, which increases security against compromised
2310+
authorization tokens and CSRF attacks.
2311+
"""
2312+
2313+
http_only_cookie_attribute: bool
2314+
"""
2315+
Enables the HttpOnly cookie attribute, which increases security against XSS
2316+
attacks.
2317+
"""
2318+
2319+
logo_url: str
2320+
"""The image URL for the logo shown in the App Launcher dashboard."""
2321+
2322+
name: str
2323+
"""The name of the application."""
2324+
2325+
options_preflight_bypass: bool
2326+
"""
2327+
Allows options preflight requests to bypass Access authentication and go
2328+
directly to the origin. Cannot turn on if cors_headers is set.
2329+
"""
2330+
2331+
path_cookie_attribute: bool
2332+
"""Enables cookie paths to scope an application's JWT to the application path.
2333+
2334+
If disabled, the JWT will scope to the hostname by default
2335+
"""
2336+
2337+
policies: List[BrowserRdpApplicationPolicy]
2338+
"""
2339+
The policies that Access applies to the application, in ascending order of
2340+
precedence. Items can reference existing policies or create new policies
2341+
exclusive to the application.
2342+
"""
2343+
2344+
same_site_cookie_attribute: str
2345+
"""
2346+
Sets the SameSite cookie setting, which provides increased security against CSRF
2347+
attacks.
2348+
"""
2349+
2350+
scim_config: BrowserRdpApplicationSCIMConfig
2351+
"""Configuration for provisioning to this application via SCIM.
2352+
2353+
This is currently in closed beta.
2354+
"""
2355+
2356+
self_hosted_domains: List[SelfHostedDomains]
2357+
"""List of public domains that Access will secure.
2358+
2359+
This field is deprecated in favor of `destinations` and will be supported until
2360+
**November 21, 2025.** If `destinations` are provided, then
2361+
`self_hosted_domains` will be ignored.
2362+
"""
2363+
2364+
service_auth_401_redirect: bool
2365+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2366+
2367+
session_duration: str
2368+
"""The amount of time that tokens issued for this application will be valid.
2369+
2370+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2371+
ms, s, m, h.
2372+
"""
2373+
2374+
skip_interstitial: bool
2375+
"""Enables automatic authentication through cloudflared."""
2376+
2377+
tags: List[str]
2378+
"""The tags you want assigned to an application.
2379+
2380+
Tags are used to filter applications in the App Launcher dashboard.
2381+
"""
2382+
2383+
2384+
class BrowserRdpApplicationTargetCriterion(TypedDict, total=False):
2385+
port: Required[int]
2386+
"""The port that the targets use for the chosen communication protocol.
2387+
2388+
A port cannot be assigned to multiple protocols.
2389+
"""
2390+
2391+
protocol: Required[Literal["ssh"]]
2392+
"""The communication protocol your application secures."""
2393+
2394+
target_attributes: Required[Dict[str, List[str]]]
2395+
"""Contains a map of target attribute keys to target attribute values."""
2396+
2397+
2398+
class BrowserRdpApplicationDestinationPublicDestination(TypedDict, total=False):
2399+
type: Literal["public"]
2400+
2401+
uri: str
2402+
"""The URI of the destination.
2403+
2404+
Public destinations' URIs can include a domain and path with
2405+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2406+
"""
2407+
2408+
2409+
class BrowserRdpApplicationDestinationPrivateDestination(TypedDict, total=False):
2410+
cidr: str
2411+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2412+
2413+
hostname: str
2414+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2415+
2416+
l4_protocol: Literal["tcp", "udp"]
2417+
"""The L4 protocol of the destination.
2418+
2419+
When omitted, both UDP and TCP traffic will match.
2420+
"""
2421+
2422+
port_range: str
2423+
"""The port range of the destination.
2424+
2425+
Can be a single port or a range of ports. When omitted, all ports will match.
2426+
"""
2427+
2428+
type: Literal["private"]
2429+
2430+
vnet_id: str
2431+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2432+
2433+
2434+
BrowserRdpApplicationDestination: TypeAlias = Union[
2435+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2436+
]
2437+
2438+
2439+
class BrowserRdpApplicationPolicyAccessAppPolicyLink(TypedDict, total=False):
2440+
id: str
2441+
"""The UUID of the policy"""
2442+
2443+
precedence: int
2444+
"""The order of execution for this policy.
2445+
2446+
Must be unique for each policy within an app.
2447+
"""
2448+
2449+
2450+
class BrowserRdpApplicationPolicyUnionMember2(TypedDict, total=False):
2451+
id: str
2452+
"""The UUID of the policy"""
2453+
2454+
approval_groups: Iterable[ApprovalGroupParam]
2455+
"""Administrators who can approve a temporary authentication request."""
2456+
2457+
approval_required: bool
2458+
"""
2459+
Requires the user to request access from an administrator at the start of each
2460+
session.
2461+
"""
2462+
2463+
isolation_required: bool
2464+
"""
2465+
Require this application to be served in an isolated browser for users matching
2466+
this policy. 'Client Web Isolation' must be on for the account in order to use
2467+
this feature.
2468+
"""
2469+
2470+
precedence: int
2471+
"""The order of execution for this policy.
2472+
2473+
Must be unique for each policy within an app.
2474+
"""
2475+
2476+
purpose_justification_prompt: str
2477+
"""A custom message that will appear on the purpose justification screen."""
2478+
2479+
purpose_justification_required: bool
2480+
"""Require users to enter a justification when they log in to the application."""
2481+
2482+
session_duration: str
2483+
"""The amount of time that tokens issued for the application will be valid.
2484+
2485+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2486+
ms, s, m, h.
2487+
"""
2488+
2489+
2490+
BrowserRdpApplicationPolicy: TypeAlias = Union[
2491+
BrowserRdpApplicationPolicyAccessAppPolicyLink, str, BrowserRdpApplicationPolicyUnionMember2
2492+
]
2493+
2494+
2495+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2496+
TypedDict, total=False
2497+
):
2498+
client_id: Required[str]
2499+
"""
2500+
Client ID of the Access service token used to authenticate with the remote
2501+
service.
2502+
"""
2503+
2504+
client_secret: Required[str]
2505+
"""
2506+
Client secret of the Access service token used to authenticate with the remote
2507+
service.
2508+
"""
2509+
2510+
scheme: Required[Literal["access_service_token"]]
2511+
"""The authentication scheme to use when making SCIM requests to this application."""
2512+
2513+
2514+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2515+
TypedDict, total=False
2516+
):
2517+
client_id: Required[str]
2518+
"""
2519+
Client ID of the Access service token used to authenticate with the remote
2520+
service.
2521+
"""
2522+
2523+
client_secret: Required[str]
2524+
"""
2525+
Client secret of the Access service token used to authenticate with the remote
2526+
service.
2527+
"""
2528+
2529+
scheme: Required[Literal["access_service_token"]]
2530+
"""The authentication scheme to use when making SCIM requests to this application."""
2531+
2532+
2533+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2534+
SCIMConfigAuthenticationHTTPBasicParam,
2535+
SCIMConfigAuthenticationOAuthBearerTokenParam,
2536+
SCIMConfigAuthenticationOauth2Param,
2537+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2538+
]
2539+
2540+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2541+
SCIMConfigAuthenticationHTTPBasicParam,
2542+
SCIMConfigAuthenticationOAuthBearerTokenParam,
2543+
SCIMConfigAuthenticationOauth2Param,
2544+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2545+
Iterable[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2546+
]
2547+
2548+
2549+
class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
2550+
idp_uid: Required[str]
2551+
"""
2552+
The UID of the IdP to use as the source for SCIM resources to provision to this
2553+
application.
2554+
"""
2555+
2556+
remote_uri: Required[str]
2557+
"""The base URI for the application's SCIM-compatible API."""
2558+
2559+
authentication: BrowserRdpApplicationSCIMConfigAuthentication
2560+
"""
2561+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2562+
provisioning to an application.
2563+
"""
2564+
2565+
deactivate_on_delete: bool
2566+
"""
2567+
If false, propagates DELETE requests to the target application for SCIM
2568+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2569+
targets do not support DELETE operations.
2570+
"""
2571+
2572+
enabled: bool
2573+
"""Whether SCIM provisioning is turned on for this application."""
2574+
2575+
mappings: Iterable[SCIMConfigMappingParam]
2576+
"""
2577+
A list of mappings to apply to SCIM resources before provisioning them in this
2578+
application. These can transform or filter the resources to be provisioned.
2579+
"""
2580+
2581+
22202582
ApplicationUpdateParams: TypeAlias = Union[
22212583
SelfHostedApplication,
22222584
SaaSApplication,
@@ -2227,4 +2589,5 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22272589
BrowserIsolationPermissionsApplication,
22282590
BookmarkApplication,
22292591
InfrastructureApplication,
2592+
BrowserRdpApplication,
22302593
]

‎src/cloudflare/types/zero_trust/access/application_update_response.py

+310
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,17 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105+
"BrowserRdpApplication",
106+
"BrowserRdpApplicationTargetCriterion",
107+
"BrowserRdpApplicationDestination",
108+
"BrowserRdpApplicationDestinationPublicDestination",
109+
"BrowserRdpApplicationDestinationPrivateDestination",
110+
"BrowserRdpApplicationPolicy",
111+
"BrowserRdpApplicationSCIMConfig",
112+
"BrowserRdpApplicationSCIMConfigAuthentication",
113+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115+
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105116
]
106117

107118

@@ -1984,6 +1995,304 @@ class InfrastructureApplication(BaseModel):
19841995
updated_at: Optional[datetime] = None
19851996

19861997

1998+
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999+
port: int
2000+
"""The port that the targets use for the chosen communication protocol.
2001+
2002+
A port cannot be assigned to multiple protocols.
2003+
"""
2004+
2005+
protocol: Literal["ssh"]
2006+
"""The communication protocol your application secures."""
2007+
2008+
target_attributes: Dict[str, List[str]]
2009+
"""Contains a map of target attribute keys to target attribute values."""
2010+
2011+
2012+
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013+
type: Optional[Literal["public"]] = None
2014+
2015+
uri: Optional[str] = None
2016+
"""The URI of the destination.
2017+
2018+
Public destinations' URIs can include a domain and path with
2019+
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020+
"""
2021+
2022+
2023+
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024+
cidr: Optional[str] = None
2025+
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026+
2027+
hostname: Optional[str] = None
2028+
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029+
2030+
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031+
"""The L4 protocol of the destination.
2032+
2033+
When omitted, both UDP and TCP traffic will match.
2034+
"""
2035+
2036+
port_range: Optional[str] = None
2037+
"""The port range of the destination.
2038+
2039+
Can be a single port or a range of ports. When omitted, all ports will match.
2040+
"""
2041+
2042+
type: Optional[Literal["private"]] = None
2043+
2044+
vnet_id: Optional[str] = None
2045+
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046+
2047+
2048+
BrowserRdpApplicationDestination: TypeAlias = Union[
2049+
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050+
]
2051+
2052+
2053+
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054+
precedence: Optional[int] = None
2055+
"""The order of execution for this policy.
2056+
2057+
Must be unique for each policy within an app.
2058+
"""
2059+
2060+
2061+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062+
client_id: str
2063+
"""
2064+
Client ID of the Access service token used to authenticate with the remote
2065+
service.
2066+
"""
2067+
2068+
client_secret: str
2069+
"""
2070+
Client secret of the Access service token used to authenticate with the remote
2071+
service.
2072+
"""
2073+
2074+
scheme: Literal["access_service_token"]
2075+
"""The authentication scheme to use when making SCIM requests to this application."""
2076+
2077+
2078+
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079+
BaseModel
2080+
):
2081+
client_id: str
2082+
"""
2083+
Client ID of the Access service token used to authenticate with the remote
2084+
service.
2085+
"""
2086+
2087+
client_secret: str
2088+
"""
2089+
Client secret of the Access service token used to authenticate with the remote
2090+
service.
2091+
"""
2092+
2093+
scheme: Literal["access_service_token"]
2094+
"""The authentication scheme to use when making SCIM requests to this application."""
2095+
2096+
2097+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098+
SCIMConfigAuthenticationHTTPBasic,
2099+
SCIMConfigAuthenticationOAuthBearerToken,
2100+
SCIMConfigAuthenticationOauth2,
2101+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102+
]
2103+
2104+
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105+
SCIMConfigAuthenticationHTTPBasic,
2106+
SCIMConfigAuthenticationOAuthBearerToken,
2107+
SCIMConfigAuthenticationOauth2,
2108+
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109+
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110+
]
2111+
2112+
2113+
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114+
idp_uid: str
2115+
"""
2116+
The UID of the IdP to use as the source for SCIM resources to provision to this
2117+
application.
2118+
"""
2119+
2120+
remote_uri: str
2121+
"""The base URI for the application's SCIM-compatible API."""
2122+
2123+
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124+
"""
2125+
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126+
provisioning to an application.
2127+
"""
2128+
2129+
deactivate_on_delete: Optional[bool] = None
2130+
"""
2131+
If false, propagates DELETE requests to the target application for SCIM
2132+
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133+
targets do not support DELETE operations.
2134+
"""
2135+
2136+
enabled: Optional[bool] = None
2137+
"""Whether SCIM provisioning is turned on for this application."""
2138+
2139+
mappings: Optional[List[SCIMConfigMapping]] = None
2140+
"""
2141+
A list of mappings to apply to SCIM resources before provisioning them in this
2142+
application. These can transform or filter the resources to be provisioned.
2143+
"""
2144+
2145+
2146+
class BrowserRdpApplication(BaseModel):
2147+
domain: str
2148+
"""The primary hostname and path secured by Access.
2149+
2150+
This domain will be displayed if the app is visible in the App Launcher.
2151+
"""
2152+
2153+
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154+
2155+
type: str
2156+
"""The application type."""
2157+
2158+
id: Optional[str] = None
2159+
"""UUID"""
2160+
2161+
allow_authenticate_via_warp: Optional[bool] = None
2162+
"""
2163+
When set to true, users can authenticate to this application using their WARP
2164+
session. When set to false this application will always require direct IdP
2165+
authentication. This setting always overrides the organization setting for WARP
2166+
authentication.
2167+
"""
2168+
2169+
allowed_idps: Optional[List[AllowedIdPs]] = None
2170+
"""The identity providers your users can select when connecting to this
2171+
application.
2172+
2173+
Defaults to all IdPs configured in your account.
2174+
"""
2175+
2176+
app_launcher_visible: Optional[bool] = None
2177+
"""Displays the application in the App Launcher."""
2178+
2179+
aud: Optional[str] = None
2180+
"""Audience tag."""
2181+
2182+
auto_redirect_to_identity: Optional[bool] = None
2183+
"""When set to `true`, users skip the identity provider selection step during
2184+
login.
2185+
2186+
You must specify only one identity provider in allowed_idps.
2187+
"""
2188+
2189+
cors_headers: Optional[CORSHeaders] = None
2190+
2191+
created_at: Optional[datetime] = None
2192+
2193+
custom_deny_message: Optional[str] = None
2194+
"""
2195+
The custom error message shown to a user when they are denied access to the
2196+
application.
2197+
"""
2198+
2199+
custom_deny_url: Optional[str] = None
2200+
"""
2201+
The custom URL a user is redirected to when they are denied access to the
2202+
application when failing identity-based rules.
2203+
"""
2204+
2205+
custom_non_identity_deny_url: Optional[str] = None
2206+
"""
2207+
The custom URL a user is redirected to when they are denied access to the
2208+
application when failing non-identity rules.
2209+
"""
2210+
2211+
custom_pages: Optional[List[str]] = None
2212+
"""The custom pages that will be displayed when applicable for this application"""
2213+
2214+
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215+
"""List of destinations secured by Access.
2216+
2217+
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218+
different types of domains. If `destinations` are provided, then
2219+
`self_hosted_domains` will be ignored.
2220+
"""
2221+
2222+
enable_binding_cookie: Optional[bool] = None
2223+
"""
2224+
Enables the binding cookie, which increases security against compromised
2225+
authorization tokens and CSRF attacks.
2226+
"""
2227+
2228+
http_only_cookie_attribute: Optional[bool] = None
2229+
"""
2230+
Enables the HttpOnly cookie attribute, which increases security against XSS
2231+
attacks.
2232+
"""
2233+
2234+
logo_url: Optional[str] = None
2235+
"""The image URL for the logo shown in the App Launcher dashboard."""
2236+
2237+
name: Optional[str] = None
2238+
"""The name of the application."""
2239+
2240+
options_preflight_bypass: Optional[bool] = None
2241+
"""
2242+
Allows options preflight requests to bypass Access authentication and go
2243+
directly to the origin. Cannot turn on if cors_headers is set.
2244+
"""
2245+
2246+
path_cookie_attribute: Optional[bool] = None
2247+
"""Enables cookie paths to scope an application's JWT to the application path.
2248+
2249+
If disabled, the JWT will scope to the hostname by default
2250+
"""
2251+
2252+
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253+
2254+
same_site_cookie_attribute: Optional[str] = None
2255+
"""
2256+
Sets the SameSite cookie setting, which provides increased security against CSRF
2257+
attacks.
2258+
"""
2259+
2260+
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261+
"""Configuration for provisioning to this application via SCIM.
2262+
2263+
This is currently in closed beta.
2264+
"""
2265+
2266+
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267+
"""List of public domains that Access will secure.
2268+
2269+
This field is deprecated in favor of `destinations` and will be supported until
2270+
**November 21, 2025.** If `destinations` are provided, then
2271+
`self_hosted_domains` will be ignored.
2272+
"""
2273+
2274+
service_auth_401_redirect: Optional[bool] = None
2275+
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276+
2277+
session_duration: Optional[str] = None
2278+
"""The amount of time that tokens issued for this application will be valid.
2279+
2280+
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281+
ms, s, m, h.
2282+
"""
2283+
2284+
skip_interstitial: Optional[bool] = None
2285+
"""Enables automatic authentication through cloudflared."""
2286+
2287+
tags: Optional[List[str]] = None
2288+
"""The tags you want assigned to an application.
2289+
2290+
Tags are used to filter applications in the App Launcher dashboard.
2291+
"""
2292+
2293+
updated_at: Optional[datetime] = None
2294+
2295+
19872296
ApplicationUpdateResponse: TypeAlias = Union[
19882297
SelfHostedApplication,
19892298
SaaSApplication,
@@ -1994,4 +2303,5 @@ class InfrastructureApplication(BaseModel):
19942303
BrowserIsolationPermissionsApplication,
19952304
BookmarkApplication,
19962305
InfrastructureApplication,
2306+
BrowserRdpApplication,
19972307
]

‎tests/api_resources/zero_trust/access/test_applications.py

+890-32
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)
Please sign in to comment.