kakariko
Private app dashboard at apps.chrisalvis.me
๐ How access works
Every app is protected by Cloudflare Access โ a zero-trust layer that sits in front of the entire platform. There are no open ports, no shared passwords, and no way in without a verified device or identity. To use the dashboard at apps.chrisalvis.me, you first need to be granted access one of the ways below.
๐ฑ Option 1 โ WARP Recommended
Cloudflare WARP is a lightweight client that enrolls your device with the zero-trust network. Once enrolled, your device is recognized automatically โ no login prompts, no re-authentication. Just open the app and everything works.
iPhone / Android
- Install the 1.1.1.1 / WARP app
- Tap the menu โ Account โ Login with Cloudflare Zero Trust
- Enter organization:
alvisleet - Sign in with your Google or GitHub account
- Toggle WARP on โ you're in
Windows / macOS / Linux
- Download Cloudflare WARP for desktop
- Click the tray icon โ Preferences โ Account โ Login with Cloudflare Zero Trust
- Organization:
alvisleet, sign in with Google or GitHub
๐ Option 2 โ Browser login
No VPN required. When you visit apps.chrisalvis.me without an enrolled device, Cloudflare Access will intercept the request and present a login page. Authenticate with:
- Google โ any authorized Google account
- GitHub โ any authorized GitHub account
Cloudflare issues a short-lived session token on sign-in. You'll need to re-authenticate periodically.
๐บ Smart TVs & consoles
WARP doesn't have a native client for smart TVs, game consoles, or similar devices. Options:
- Router-level WARP โ enroll your router so your entire home network is covered, no per-device setup needed
- WARP Connector โ a lightweight VM or container that acts as a WARP gateway for a subnet
๐ก๏ธ Security model
The platform runs on a private Kubernetes cluster reachable only through a Cloudflare Tunnel โ no ports are exposed to the internet. Cloudflare Access enforces policy at the edge before any request reaches an app. Enrolled WARP devices are verified by device posture; browser sessions are verified by identity provider token. Sessions expire and must be re-verified periodically.