Cloudflare Access — OTP delivered via email. No external identity provider required.
Loading...
Cloudflare Access intercepts the request before it reaches the origin. If no valid CF_Authorization cookie exists, the user is redirected to the Access login page. With OTP selected as the identity provider, the user enters their email address and Cloudflare sends a one-time code directly — no external IdP involved.
The Access policy controls which email addresses or domains are permitted. On successful verification, Cloudflare issues a signed JWT and sets it as a cookie on the domain. Subsequent requests carry this cookie and bypass the login screen until expiry.
barbicancloud.co.uk/otp/* (path) or otp.barbicancloud.co.uk (subdomain)barbicancloud.co.uk)Note: OTP is the simplest Access method to configure. It requires no app registration in Entra or any external system. Use it to validate that your Access Application and policy are working before adding a full IdP.
barbicancloud.co.uk/otp/otp.barbicancloud.co.uk