{"id":805,"date":"2021-08-11T14:50:00","date_gmt":"2021-08-11T12:50:00","guid":{"rendered":"https:\/\/affluences.com\/blog\/?p=805"},"modified":"2022-06-24T17:39:52","modified_gmt":"2022-06-24T15:39:52","slug":"utilisation-cloudflare-securiser-infrastructure","status":"publish","type":"post","link":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/","title":{"rendered":"Comment a-t-on utilis\u00e9 Cloudflare pour s\u00e9curiser notre infrastructure ?"},"content":{"rendered":"\n<p id=\"viewer-foo\">Avec la g\u00e9n\u00e9ralisation du t\u00e9l\u00e9travail, on doit permettre \u00e0 nos collaborateurs de travailler dans des environnements h\u00e9t\u00e9rog\u00e8nes. Il nous semble aussi important de leur permettre d\u2019acc\u00e9der \u00e0 des ressources prot\u00e9g\u00e9es de mani\u00e8re s\u00e9curis\u00e9e. Chez Affluences, on a choisi d\u2019utiliser <strong>Cloudflare pour s\u00e9curiser notre infrastructure<\/strong>, on vous explique pourquoi !<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"viewer-6161u\">Quelle solution choisir pour s\u00e9curiser notre infrastructure ?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"viewer-k352\"><strong>VPN<\/strong> : la plus utilis\u00e9e en g\u00e9n\u00e9ral<\/h3>\n\n\n\n<p id=\"viewer-96lp5\">Solution robuste et \u00e9prouv\u00e9e, c\u2019est probablement la plus utilis\u00e9e aujourd\u2019hui mais elle n\u2019est pas sans d\u00e9faut. Il est contraignant pour l\u2019utilisateur d\u2019avoir constamment un client VPN actif tout en g\u00e9rant une flotte de serveurs et de certificats. Il est \u00e9galement important de noter que les solutions VPNs apportent g\u00e9n\u00e9ralement une p\u00e9nalit\u00e9 de performances et de bande passante.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"viewer-fa1uq\"><strong>SSH<\/strong> : m\u00eame probl\u00e8me que les VPN<\/h3>\n\n\n\n<p id=\"viewer-9hqcf\">Solution \u00e9galement contraignante en terme de maintenance pour les m\u00eames raisons qu\u2019un VPN. L\u2019utilisateur doit ouvrir autant de tunnels que de services auxquels il veut acc\u00e9der ce qui n\u2019est pas id\u00e9al non plus. De plus nous visons \u00e0 r\u00e9duire au strict minimum les acc\u00e8s SSH.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"viewer-7mlpg\"><strong>Zero Trust <\/strong>: notre choix de s\u00e9curit\u00e9<\/h3>\n\n\n\n<p id=\"viewer-79r5n\">Ce mod\u00e8le de s\u00e9curit\u00e9 repose sur le principe que tous les utilisateurs sont consid\u00e9r\u00e9s comme indignes de confiance. L\u2019avantage est simple : on rejette par d\u00e9faut une demande d\u2019acc\u00e8s. C\u2019est l\u2019inverse d\u2019un acc\u00e8s r\u00e9seau VPN qui consid\u00e8re qu\u2019un utilisateur est digne de confiance lorsqu\u2019il est en mesure de se connecter. On peut facilement permettre un acc\u00e8s \u00e0 distance quel que soit le r\u00e9seau utilis\u00e9 pour acc\u00e9der \u00e0 la ressource prot\u00e9g\u00e9e.<\/p>\n\n\n\n<p id=\"viewer-3tfb8\">C\u2019est cette derni\u00e8re solution que nous avons retenue !<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"viewer-5h9oj\">Le r\u00e9seau Cloudflare (Access et Argo Tunnel)<\/h3>\n\n\n\n<p id=\"viewer-d5osj\">Nous avons donc fait le choix d\u2019utiliser le r\u00e9seau <strong>Cloudflare<\/strong> pour s\u00e9curiser notre infrastructure et l\u2019acc\u00e8s \u00e0 distance. En particulier \u00e0 l\u2019aide de deux produits :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Cloudflare Access<\/strong> : c\u2019est la solution Zero Trust de Cloudflare. Elle permet d\u2019exposer des ressources prot\u00e9g\u00e9es au travers du r\u00e9seau Cloudflare en utilisant le fournisseur d\u2019identit\u00e9 (ex: Google SSO, SAML, OIDC, etc.) de notre choix pour g\u00e9rer les utilisateurs et leurs droits.<\/li><li><strong>Cloudflare Argo Tunnel <\/strong>: c\u2019est une solution de tunneling qui fait le pont entre nos ressources prot\u00e9g\u00e9es et le r\u00e9seau Cloudflare. Elle permet de ne pas exposer nos services sur un port publique tout en chiffrant les \u00e9changes. Argo Tunnel ne g\u00e8re pas l\u2019authentification. Elle fonctionne conjointement avec Access pour s\u00e9curiser l\u2019acc\u00e8s aux ressources expos\u00e9es au bout du tunnel.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"viewer-4jrko\">Docker Over Argo : le premier projet Open Source d\u2019Affluences<\/h2>\n\n\n\n<p id=\"viewer-22bog\">Il nous arrive r\u00e9guli\u00e8rement de <strong>d\u00e9velopper nos propres outils<\/strong>. Nos services, comme beaucoup d\u2019autres, sont d\u00e9velopp\u00e9s \u00e0 l\u2019aide de <strong>projets open source<\/strong>. Nous avons d\u00e9cid\u00e9 d\u2019ouvrir plus largement certains de nos projets pour contribuer, \u00e0 notre \u00e9chelle, \u00e0 l\u2019\u00e9cosyst\u00e8me.<\/p>\n\n\n\n<p id=\"viewer-1nc\">C\u2019est le cas de <a href=\"https:\/\/gitlab.com\/affluences\/open-source\/doa\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Docker Over Argo<\/u><\/a>, le <strong>premier projet Open Source d\u2019Affluences<\/strong> que nous utilisons sur nos clusters de containers !<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/static.wixstatic.com\/media\/42db33_dd63f5d0c3f54de096f2a78fa902a4c6~mv2.png\/v1\/fill\/w_1480,h_934,al_c,q_95\/42db33_dd63f5d0c3f54de096f2a78fa902a4c6~mv2.webp\" alt=\"Projet Docker Over Argo sur Gitlab - Affluences\"\/><figcaption>Notre projet Docker Over Argo sur Gitlab<\/figcaption><\/figure>\n\n\n\n<p>Notre projet Docker Over Argo sur Gitlab<\/p>\n\n\n\n<p id=\"viewer-8rlp4\"><strong>Docker Over Argo (DOA)<\/strong> est un utilitaire qui permet d\u2019ouvrir automatiquement des tunnels Argo vers des services d\u00e9ploy\u00e9s sur un cluster <a href=\"https:\/\/www.docker.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Docker Swarm<\/u><\/a>. Il permet, par exemple, aux d\u00e9veloppeurs d\u2019acc\u00e9der \u00e0 l\u2019<strong>environnement staging<\/strong> directement depuis leur poste de travail et de mani\u00e8re s\u00e9curis\u00e9e.<\/p>\n\n\n\n<p id=\"viewer-ev5od\"><strong>DOA prot\u00e8ge les services HTTP<\/strong>. Pour les services utilisant un protocol TCP arbitraire (comme les bases de donn\u00e9es) nous avons d\u00e9ploy\u00e9 Argo Tunnel sur les machines concern\u00e9es. Nos d\u00e9veloppeurs peuvent y acc\u00e9der directement en utilisant <a href=\"https:\/\/developers.cloudflare.com\/argo-tunnel\/reference\/arguments\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>l\u2019outil en ligne de commande de Cloudflare<\/u><\/a>.<\/p>\n\n\n\n<p id=\"viewer-c6992\"><strong>Cloudflare Access ne remplace pas l\u2019authentification au niveau applicatif mais ajoute une protection suppl\u00e9mentaire pour s\u00e9curiser l\u2019infrastructure.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"viewer-52vic\">L\u2019importance de l\u2019UX dans le d\u00e9ploiement du service<\/h2>\n\n\n\n<p id=\"viewer-db8m2\">Nous voulions fournir une solution d\u2019authentification qui soit la plus simple et la plus transparente possible \u00e0 nos collaborateurs. Avec la <strong>solution Cloudflare Access et Argo Tunnel<\/strong>, nous avons la possibilit\u00e9 d\u2019utiliser notre fournisseur identit\u00e9 existant ce qui r\u00e9duit drastiquement la charge en maintenance pour nos administrateurs.<\/p>\n\n\n\n<p id=\"viewer-2g177\">Pour l\u2019utilisateur, <strong>l\u2019acc\u00e8s aux services HTTP se fait de mani\u00e8re transparente<\/strong>. Le service est accessible depuis une redirection vers le portail d\u2019authentification.<\/p>\n\n\n\n<p id=\"viewer-d2cn5\">Un tunnel chiffr\u00e9 ouvert depuis l\u2019outil en ligne de commande Cloudflare ou avec <a href=\"https:\/\/hub.docker.com\/r\/affluences\/cloudflare-access-headless\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Docker<\/u><\/a> donne acc\u00e8s aux autres types de services. Il est \u00e9galement possible de s\u2019authentifier avec des Service Tokens pass\u00e9s via des headers HTTP dans le cas o\u00f9 un processus de login interactif n\u2019est pas possible.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/static.wixstatic.com\/media\/42db33_8b7f510d70de4d589286c9fad4b2d1a6~mv2.png\/v1\/fill\/w_649,h_385,al_c,lg_1,q_95\/42db33_8b7f510d70de4d589286c9fad4b2d1a6~mv2.webp\" alt=\"Authentification Cloudflare Access et Argo Tunnel\"\/><figcaption>Authentification Cloudflare Access et Argo Tunnel<\/figcaption><\/figure><\/div>\n\n\n\n<p id=\"viewer-4kpoe\">Utiliser Cloudflare nous permet d\u2019<strong>utiliser notre base d\u2019utilisateur existante<\/strong> et de <strong>prot\u00e9ger nos services priv\u00e9es<\/strong> derri\u00e8re l\u2019infrastructure Cloudflare avec simplicit\u00e9 et une grande polyvalence.<\/p>\n\n\n\n<p id=\"viewer-5e1t9\">Le<strong> mod\u00e8le de s\u00e9curit\u00e9 Zero Trust<\/strong> a rempli toutes nos exigences. Associ\u00e9 aux <strong>services de Cloudflare<\/strong>, ils nous ont permis de migrer vers ce dernier en un temps record !<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.welcometothejungle.com\/fr\/companies\/affluences\/jobs\" target=\"_blank\" rel=\"noreferrer noopener\">Rejoignez la team tech d&rsquo;Affluences<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Avec la g\u00e9n\u00e9ralisation du t\u00e9l\u00e9travail, on doit permettre \u00e0 nos collaborateurs de travailler dans des environnements h\u00e9t\u00e9rog\u00e8nes. Il nous semble aussi important de leur permettre d\u2019acc\u00e9der \u00e0 des ressources prot\u00e9g\u00e9es de mani\u00e8re s\u00e9curis\u00e9e. Chez Affluences, on a choisi d\u2019utiliser Cloudflare pour s\u00e9curiser notre infrastructure, on vous explique pourquoi ! Quelle solution choisir pour s\u00e9curiser notre [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":806,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[353],"tags":[],"class_list":["post-805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-les-dessous-de-la-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cas d&#039;usage Cloudflare : s\u00e9curisation de l&#039;infrastructure d&#039;Affluences<\/title>\n<meta name=\"description\" content=\"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cas d&#039;usage Cloudflare : s\u00e9curisation de l&#039;infrastructure d&#039;Affluences\" \/>\n<meta property=\"og:description\" content=\"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Le blog Affluences\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Affluencesapp\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T12:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-24T15:39:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Communication\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Affluences_App\" \/>\n<meta name=\"twitter:site\" content=\"@Affluences_App\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Communication\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/\"},\"author\":{\"name\":\"Communication\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#\\\/schema\\\/person\\\/4791a989685bb628373b2af9f99550f3\"},\"headline\":\"Comment a-t-on utilis\u00e9 Cloudflare pour s\u00e9curiser notre infrastructure ?\",\"datePublished\":\"2021-08-11T12:50:00+00:00\",\"dateModified\":\"2022-06-24T15:39:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/\"},\"wordCount\":904,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/affluences.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/utilisation-cloudflare-securiser-infrastructure.jpg\",\"articleSection\":[\"Dessous de la tech\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/\",\"url\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/\",\"name\":\"Cas d'usage Cloudflare : s\u00e9curisation de l'infrastructure d'Affluences\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/affluences.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/utilisation-cloudflare-securiser-infrastructure.jpg\",\"datePublished\":\"2021-08-11T12:50:00+00:00\",\"dateModified\":\"2022-06-24T15:39:52+00:00\",\"description\":\"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/affluences.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/utilisation-cloudflare-securiser-infrastructure.jpg\",\"contentUrl\":\"https:\\\/\\\/affluences.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/utilisation-cloudflare-securiser-infrastructure.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/utilisation-cloudflare-securiser-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/affluences.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment a-t-on utilis\u00e9 Cloudflare pour s\u00e9curiser notre infrastructure ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/affluences.com\\\/blog\\\/\",\"name\":\"Le blog d Affluences\",\"description\":\"Tous nos conseils et astuces\",\"publisher\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/affluences.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#organization\",\"name\":\"Affluences\",\"url\":\"https:\\\/\\\/affluences.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.affluences.com\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/logo_affluences-e1531737183907.png\",\"contentUrl\":\"https:\\\/\\\/blog.affluences.com\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/logo_affluences-e1531737183907.png\",\"width\":512,\"height\":512,\"caption\":\"Affluences\"},\"image\":{\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Affluencesapp\",\"https:\\\/\\\/x.com\\\/Affluences_App\",\"https:\\\/\\\/www.instagram.com\\\/affluences_app\\\/?hl=fr\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/affluences-app\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwPTgo4QaCais3IytxOjh0w\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Affluences\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/affluences.com\\\/blog\\\/#\\\/schema\\\/person\\\/4791a989685bb628373b2af9f99550f3\",\"name\":\"Communication\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g\",\"caption\":\"Communication\"},\"url\":\"https:\\\/\\\/affluences.com\\\/blog\\\/author\\\/melisande-vialard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cas d'usage Cloudflare : s\u00e9curisation de l'infrastructure d'Affluences","description":"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/","og_locale":"fr_FR","og_type":"article","og_title":"Cas d'usage Cloudflare : s\u00e9curisation de l'infrastructure d'Affluences","og_description":"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?","og_url":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/","og_site_name":"Le blog Affluences","article_publisher":"https:\/\/www.facebook.com\/Affluencesapp","article_published_time":"2021-08-11T12:50:00+00:00","article_modified_time":"2022-06-24T15:39:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg","type":"image\/jpeg"}],"author":"Communication","twitter_card":"summary_large_image","twitter_creator":"@Affluences_App","twitter_site":"@Affluences_App","twitter_misc":{"\u00c9crit par":"Communication","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#article","isPartOf":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/"},"author":{"name":"Communication","@id":"https:\/\/affluences.com\/blog\/#\/schema\/person\/4791a989685bb628373b2af9f99550f3"},"headline":"Comment a-t-on utilis\u00e9 Cloudflare pour s\u00e9curiser notre infrastructure ?","datePublished":"2021-08-11T12:50:00+00:00","dateModified":"2022-06-24T15:39:52+00:00","mainEntityOfPage":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/"},"wordCount":904,"commentCount":0,"publisher":{"@id":"https:\/\/affluences.com\/blog\/#organization"},"image":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg","articleSection":["Dessous de la tech"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/","url":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/","name":"Cas d'usage Cloudflare : s\u00e9curisation de l'infrastructure d'Affluences","isPartOf":{"@id":"https:\/\/affluences.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg","datePublished":"2021-08-11T12:50:00+00:00","dateModified":"2022-06-24T15:39:52+00:00","description":"Chez Affluences, on a choisi Cloudflare pour s\u00e9curiser \ud83d\udd10 notre infrastructure. Pourquoi ce choix et comment y est n\u00e9 notre premier projet Open Source ?","breadcrumb":{"@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#primaryimage","url":"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg","contentUrl":"https:\/\/affluences.com\/blog\/wp-content\/uploads\/2022\/06\/utilisation-cloudflare-securiser-infrastructure.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/affluences.com\/blog\/utilisation-cloudflare-securiser-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/affluences.com\/"},{"@type":"ListItem","position":2,"name":"Comment a-t-on utilis\u00e9 Cloudflare pour s\u00e9curiser notre infrastructure ?"}]},{"@type":"WebSite","@id":"https:\/\/affluences.com\/blog\/#website","url":"https:\/\/affluences.com\/blog\/","name":"Le blog d Affluences","description":"Tous nos conseils et astuces","publisher":{"@id":"https:\/\/affluences.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/affluences.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/affluences.com\/blog\/#organization","name":"Affluences","url":"https:\/\/affluences.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/affluences.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.affluences.com\/wp-content\/uploads\/2017\/08\/logo_affluences-e1531737183907.png","contentUrl":"https:\/\/blog.affluences.com\/wp-content\/uploads\/2017\/08\/logo_affluences-e1531737183907.png","width":512,"height":512,"caption":"Affluences"},"image":{"@id":"https:\/\/affluences.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Affluencesapp","https:\/\/x.com\/Affluences_App","https:\/\/www.instagram.com\/affluences_app\/?hl=fr","https:\/\/www.linkedin.com\/company\/affluences-app\/","https:\/\/www.youtube.com\/channel\/UCwPTgo4QaCais3IytxOjh0w","https:\/\/fr.wikipedia.org\/wiki\/Affluences"]},{"@type":"Person","@id":"https:\/\/affluences.com\/blog\/#\/schema\/person\/4791a989685bb628373b2af9f99550f3","name":"Communication","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4f0ca5379bda977b18043f3cdb63a882a87096c96317127eb6f83f033b2a5d2b?s=96&d=mm&r=g","caption":"Communication"},"url":"https:\/\/affluences.com\/blog\/author\/melisande-vialard\/"}]}},"_links":{"self":[{"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/posts\/805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/comments?post=805"}],"version-history":[{"count":2,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions"}],"predecessor-version":[{"id":836,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions\/836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/media\/806"}],"wp:attachment":[{"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/media?parent=805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/categories?post=805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/affluences.com\/blog\/wp-json\/wp\/v2\/tags?post=805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}