Uptycs
Cloudflare Zero Trust can integrate with Uptycs to require that users connect to certain applications from managed devices. This service-to-service posture check uses the WARP client to read endpoint data from Uptycs. Devices are identified by their serial numbers.
- Uptycs agent is deployed on the device.
-
Cloudflare WARP client is deployed on the device. For a list of supported modes and operating systems, refer to Service providers.
The following Uptycs values are needed to set up the Uptycs posture check:
- Client key
- Client Secret
- Customer ID
To obtain these values:
- Open your Uptycs console.
- Go to Account Settings > API Key.
- Generate and download your
.json
file. This file will contain your Client key, Client Secret and Customer ID.
- In Zero Trust ↗, go to Settings > WARP Client.
- Scroll down to Third-party service provider integrations and select Add new.
- Select Uptycs.
- Enter any name for the provider. This name will be used throughout the dashboard to reference this connection.
- Enter the Client ID, Client secret and Customer ID as you noted down above.
- Select a Polling frequency for how often Cloudflare Zero Trust should query Uptycs for information.
- Select Save.
You will see the new provider listed under Settings > WARP Client > Third-party service provider integrations. To ensure the values have been entered correctly, select Test.
- In Zero Trust ↗, go to Settings > WARP Client > Service provider checks.
- Select Add new.
- Select the Uptycs provider.
- Enter any name for the posture check.
- Configure the attributes required for the device to pass the posture check.
- Select Save.
- To test, go to Logs > Posture and verify that the service provider posture check is returning the expected results.
You can now use this posture check in a device posture policy.
Selector | Description |
---|---|
Score | Zero Trust score assigned to the device by Uptycs |