Configuring Cloudflare for SaaS
Before you begin
Before you start creating custom hostnames:
- Add your zone to Cloudflare on a Free plan.
- Enable Cloudflare for SaaS for your zone.
- Review the Hostname prioritization guidelines. Wildcard custom hostnames behave differently than an exact hostname match.
- (optional) Review the following documentation:
- API documentation (if you have not worked with the Cloudflare API before).
- Certificate validation.
Initial setup
When you first enable Cloudflare for SaaS, you need to perform a few steps prior to creating any custom hostnames.
Step 1 — Create fallback origin
The fallback origin is where Cloudflare will route traffic sent to your custom hostnames (must be proxied).
To create your fallback origin:
- Create a proxied
A
,AAAA
, orCNAME
record pointing to the IP address of your fallback origin (where Cloudflare will send custom hostname traffic).
Type | Name | IPv4 address | Proxy status |
---|---|---|---|
A | proxy-fallback | 192.0.2.1 | Proxied |
- Designate that record as your fallback origin.
- Log into the Cloudflare dashboard.
- Select your account and zone.
- Go to SSL/TLS > Custom Hostnames.
- For Fallback Origin, enter the hostname for your fallback origin.
- Select Add Fallback Origin.
- Once you have added the fallback origin, confirm that its status is Active.
Step 2 (optional) — Create CNAME target
The CNAME
target — optional, but highly encouraged — provides a friendly and more flexible place for customers to route their traffic. You may want to use a subdomain such as customers.<SAAS_PROVIDER>.com
.
Create a proxied CNAME
that points your CNAME
target to your fallback origin (can be a wildcard such as *.customers.saasprovider.com
).
Type | Name | IPv4 address | Proxy status |
---|---|---|---|
CNAME | .customers | proxy-fallback.saasprovider.com | Proxied |
Per-hostname setup
You need to perform the following steps for each custom hostname.
Step 1 — Plan for validation
Before you create a hostname, you need to plan for:
- Certificate validation: Upon successful validation, the certificates are deployed to Cloudflare’s global network.
- Hostname validation: Upon successful validation, Cloudflare proxies traffic for this hostname.
You must complete both these steps for the hostname to work as expected.
Step 2 — Create custom hostname
After planning for certification and hostname validation, you can create the custom hostname.
To create a custom hostname:
- Log in to the Cloudflare dashboard and select your account.
- Select your Cloudflare for SaaS application.
- Navigate to SSL/TLS > Custom Hostnames.
- Click Add Custom Hostname.
- Add your customer’s hostname
app.customer.com
and set the relevant options, including:- Choosing the Validation method.
- Whether you want to Enable wildcard, which adds a
*.<custom-hostname>
SAN to the custom hostname certificate. For more details, refer to Hostname priority. - Choosing a value for Custom origin server.
- Click Add Custom Hostname.
To create a custom hostname using the API, use the Create Custom Hostname endpoint.
- You can leave the
certificate_authority
parameter empty to set it to “default CA”. With this option, Cloudflare checks the CAA records before requesting the certificates, which helps ensure the certificates can be issued from the CA.
- You can leave the
For the newly created custom hostname, the
POST
response may not return the DCV validation tokenvalidation_records
. It is recommended to make a secondGET
command (with a delay) to retrieve these details.
The response contains the complete definition of the new custom hostname.
Step 3 — Have customer create CNAME record
To finish the custom hostname setup, your customer needs to set up a CNAME
record at their authoritative DNS that points to your CNAME
target 1.
Your customer’s CNAME
record might look like the following:
www.mystore.com CNAME customers.saasprovider.com
This record would route traffic in the following way:
Requests to www.mystore.com
would go to your CNAME
target (customers.saasprovider.com
), which would then route to your fallback origin (proxy-fallback.saasprovider.com
).
Service continuation
If your customer is also using Cloudflare for their domain, they should keep their DNS record pointing to your SaaS provider in place for as long as they want to use your service.
For more details, refer to Remove custom hostnames.
If you have regional services set up for your custom hostnames, Cloudflare always uses the processing region associated with your DNS target record (instead of the processing region of any custom origins). ↩︎